Guest Post – Beyond Borders: How AI is Making Global Collaboration Simpler, Faster, and More Human

Posted in Commentary with tags on September 2, 2025 by itnerd

Written by Loïe Favre (https://www.smartcat.com/authors/lfh_speaker_loie_favre/)

The ability to communicate and collaborate across languages and cultures is no longer a luxury but a necessity. A new generation of intelligent AI translation tools is breaking down old barriers, turning complex, fragmented global workflows into seamless engines for connection and growth. By making life easier and boosting productivity, these tools are not just changing how businesses operate—they are helping people connect on a global scale more effectively than ever before.

This article explores how these AI tools are delivering tangible benefits, highlights key applications across different professional fields, and looks at the emerging trends that will shape our future.

A New Era of Productivity and Connection

The most immediate impact of AI translation tools on global teams is a dramatic boost in speed and efficiency, which translates into more time for meaningful work. For any organization operating globally, this shift is transformative.

  • Reduced Cycle Time: Tasks that previously took weeks, such as localizing a global marketing campaign or updating training materials in multiple languages, can now be completed in days or even hours. This acceleration allows ideas to reach a global audience while they are still relevant and impactful.
  • Fewer Handoffs: Intelligent automation eliminates many of the repetitive, manual tasks that slow teams down—like copying content between systems, reformatting files, and managing endless review cycles. This frees up human talent to focus on strategy, creativity, and building relationships.
  • Lower Operational Costs: By streamlining processes and reducing reliance on manual, third-party interventions for every task, organizations can operate more efficiently. The 2025 Stanford AI Index Report highlights these gains, with companies reporting significant cost savings in service operations (49%), supply chain management (43%), and software engineering (41%).

Ultimately, this efficiency is about more than just the bottom line. It’s about removing friction. When teams can scale their work globally without the usual roadblocks of delays and cultural silos, they can spend more energy on innovation and connection. As Ivan Smolnikov, CEO of Smartcat, puts it, “every enterprise dreams of scaling globally without the usual roadblocks—global campaign delays, cultural silos, and bottlenecks in transferring expertise.”

The best systems achieve this through a powerful partnership between AI and human expertise. By letting AI handle the initial heavy lifting and empowering human reviewers to refine and approve the work, this “human-in-the-loop” approach delivers both speed and quality, achieving better outcomes than either AI or humans could alone.

A key innovation driving this partnership is adaptive AI translation. Unlike static models, adaptive AI tools learn in real-time from every correction made by a human reviewer. When a linguist adjusts a phrase for tone or accuracy, for example, the system instantly absorbs that feedback, ensuring it won’t make the same mistake again in future content. This creates a powerful feedback loop where the AI becomes a continuously improving student of your brand’s unique voice.

Uniting a Global Voice: Consistency Across Cultures

Maintaining a clear and consistent message across dozens of languages is a monumental challenge. AI tools are proving instrumental in solving this, ensuring that an organization’s core identity and values resonate universally.

These AI translation systems act as guardians of brand consistency, applying the same rules, terminology, and brand guidelines to all content, regardless of the target language. Through features like centralized glossary management, they ensure that critical terms, from product names to compliance language, are used correctly everywhere. More advanced AI translation tools take this a step further by incorporating AI-driven quality estimation. This feature automatically scans translated text, flagging sentences that may sound awkward or deviate from the source’s meaning. This allows human reviewers to focus their attention on the small fraction of content that needs refinement instead of manually checking every word, dramatically accelerating the quality assurance process. This prevents the kind of linguistic inconsistencies that can confuse customers, dilute a brand’s message, and erode trust.

This synergy between AI-driven consistency and human oversight empowers global teams to maintain high standards of quality while moving at an unprecedented pace, fostering a unified brand presence that speaks authentically to every market.

Practical Applications: AI Tools at Work

Across industries, intelligent AI software is already delivering powerful results. These real-world applications show how these tools are making work easier and more impactful today.

1. Marketing and Global Communications Marketing teams use AI translation tools to create, localize, and launch global campaigns with remarkable speed. In fact, nearly 70% of companies are already using cloud-based generative AI, according to Statista research on AI tool usage. Teams can now create content in multiple languages simultaneously, ensuring that a single, cohesive message is adapted for local nuances and ready for a global launch in days, not weeks. Nicole DiNicola, VP of Marketing of Smartcat, who has also led AI implementations for her teams at major brands, notes that, “marketing has always been about impact. AI agents give us a chance to have more of it, with less friction.”

  • Example applications: Global product launches, multilingual email campaigns, website localization, and social media content.

2. Learning & Development (L&D) AI translation now makes it possible for L&D professionals to create and update corporate training programs for a global workforce in a fraction of the time. This is especially vital for compliance training, where accuracy is non-negotiable. When regulations change, updates can be rolled out instantly across all language versions, keeping the entire organization aligned.

  • Example applications: Employee onboarding, compliance training, product knowledge courses, and skills development programs.

3. E-commerce and Retail Operations For e-commerce businesses, AI is accelerating the process of localizing vast product catalogs. By integrating directly with Product Information Management (PIM) systems, AI can ingest product data, apply translation and glossary rules, and sync updates automatically. This keeps online stores and retail partners perfectly aligned without cumbersome spreadsheets. Companies using this approach have reported dramatic reductions in turnaround time, with tasks that once took hours now completed in mere minutes.

The Road Ahead: What’s Next for AI Translation

The AI landscape is evolving at a breathtaking pace. Key trends point toward even deeper integration and broader adoption in the near future.

  • From Niche Tool to Workplace Staple: AI is rapidly moving from specialized departments to enterprise-wide implementation. Gartner forecasts that by 2028, approximately one-third of all enterprise software applications will have these intelligent capabilities embedded within them.
  • The Power of an Integrated Ecosystem: Standalone tools are giving way to integrated platforms where multiple AI agents work together to automate end-to-end processes. By connecting with CRM, CMS, and LMS tools through APIs, these ecosystems create seamless workflows across the entire organization.
  • Smarter, More Capable AI: The underlying large language models are becoming exponentially more powerful. Research shows that the length of complex tasks AI can handle is doubling roughly every seven months. When applied to business, this means AI can tackle specialized content like legal documents and technical manuals that once required extensive human effort.

A More Connected Future

AI translation technology has moved beyond hype to deliver tangible outcomes. Teams are more productive, brands are more consistent, and global operations are more efficient. But the real story is a human one. By automating the mundane and accelerating collaboration, these tools are empowering people to connect more effectively across linguistic and cultural divides. The future of work is emerging as a partnership between human talent and technology, building a world where great ideas are shared, understood, and embraced by everyone, everywhere.

The U.S. leads with over 2M breached accounts in the first half of 2025

Posted in Commentary with tags on September 2, 2025 by itnerd

Cybernews’ latest overview of the first half of 2025 reveals that the total number of breached accounts fell by 20 times compared to the same period in 2024, according to Cybernews’ Personal Data Leak Checker tool.

However, while breaches have dropped significantly compared to last year, several countries remain highly vulnerable as millions of accounts remain exposed. The top three countries with the highest number of breaches in 2025 are the U.S., with 2.5 million breached accounts, France, with 1.8 million breached accounts, and India, with 1.2 million breached accounts.

This report offers key insights into global data breach trends in the first half of 2025, highlighting that unsafe online practices such as subscriptions to suspicious websites and weak password reuse remain the leading causes of breaches.

Key findings of this research:

  • The first six months of 2025 recorded 15.8 million breached accounts globally.
  • The top five countries most breached worldwide in the first six months of 2025 are the U.S., France, India, Russia, and Venezuela.
  • January has the highest number of breached accounts in 2025 so far.
  • Countries experienced a spike in breach numbers in March, making it the second most breached month in the first six months of 2025. 
  • The second quarter of 2025 saw a 77% dip in breached accounts.
  • Despite a 20-fold drop compared to 2024, breach density per capita shows the U.S. remains the most affected nation, with 8 in every 1,000 internet users impacted.

To read the full research, please click here.

September Is Insider Threat Awareness Month

Posted in Commentary on September 1, 2025 by itnerd

In recognition of September’s Insider Threat Awareness Month, here are some insights from Ryan Sherstobitoff, Chief Threat Intelligence Officer at SecurityScorecard

“Insider Threat Awareness Month serves as a timely reminder that some of the most damaging breaches often originate from within. Whether it’s a misstep by a well-meaning employee or a malicious actor with privileged access, insider threats often bypass traditional defenses and go undetected for weeks. This is especially true in hybrid environments where visibility is fragmented across endpoints, cloud services, and third-party vendors. 

To combat this threat, organizations should prioritize continuous monitoring and behavioral analytics. This means having tools in place to watch for unusual activity, such as an employee accessing sensitive data outside of normal work hours or attempting to bypass security controls. Organizations must also have a clear, documented incident response plan for insider threats, including who to contact and what steps to take. This plan should involve human resources, legal, and IT teams. Lastly, a crucial step is to encourage employees to report suspicious behavior via a clearly defined anonymous process. 

That effort must extend to the systems and vendors with access to your own environment, where risk often hides in plain sight. Surfacing these signals early helps prevent escalation into full-blown incidents. 

As insider threats grow more complex, blending human error with credential misuse and social engineering, smarter detection methods are essential. Insider Threat Awareness Month is not just about awareness, it is a call to action. The organizations that act now will be best equipped to protect their data, their people, and their reputation.” 

Today Is International Women In Cyber Day

Posted in Commentary on September 1, 2025 by itnerd

With International Women in Cyber Day being today here’s some commentary from female cybersecurity experts, including Outpost24’s newly appointed CISO. 

Olivia Brännlund, CISO at Outpost24: 

“Cybersecurity is one of the most dynamic and rewarding industries to be in today. It is constantly evolving, shaped by new technologies, emerging threats, and shifting regulations. That pace of change can feel relentless, but it also means there is always something new to learn and an opportunity to make a tangible impact. As a female CISO, I am also encouraged to see more women entering leadership positions across the industry, although there is still work to be done to improve representation and diversity.”

Anna Collard, SVP of Content Strategy and Evangelist at KnowBe4: 

“As someone who never quite fit into a single mold, I’ve found strength in being a multi-disciplined ‘amateur’, dabbling across art, mental health, yoga, podcasts, cartoons and – of course – cybersecurity. It’s the fusion of varied interests that fuels creativity in this exciting field.”

“Launching a cybersecurity training product by sketching cartoons on a beach, getting feedback from peers before building it and finally turning that into a real learning tool taught me the power of true connection from the very beginning. After all, understanding users is what guides relevance and impact, especially when it comes to cybersecurity.”

“I have also learned that diversity, from hiring across backgrounds, and ruthlessly avoiding distractions like vanity metrics, helps build stronger, more meaningful connections. When you get this balance right, you’ll see a natural and progressive improvement in cyber and organizational resiliency, as people are ultimately the best line of defence against cyberthreats.”

“On International Women in Cyber Day, I celebrate the non-linear paths, the multi-passion journeys, diversity and the power of bringing heart, creativity and mindfulness into cybersecurity. Because when we do, we build safer systems that are richer, more inclusive and ultimately, far more effective.”

The Salvation Army notifies victims of data breach that leaked Social Security Numbers 

Posted in Commentary with tags on August 29, 2025 by itnerd

The Salvation Army is notifying victims of a May 2025 data breach that leaked names, Social Security Numbers, and driver’s license numbers. Ransomware group Chaos claimed responsibility for the data breach at the end of May. The Salvation Army has not verified Chaos’ claim.

Commenting on this is Paul Bischoff, Consumer Privacy Advocate at Comparitech

“Chaos is a ransomware gang that first surfaced in 2021 but didn’t start claiming victims on its data leak site until March 2025. The group attacks both individuals and organizations through drive-by-downloads and phishing. It employs a double-extortion scheme in which organizations are extorted both for stolen data and to restore infected systems. Chaos has taken credit for three other confirmed ransomware attacks and made eight more unconfirmed claims that haven’t been publicly acknowledged by the targeted organizations.”

“In 2025 to date, Comparitech researchers have logged 632 confirmed ransomware attacks compromising 28.8 million records. The average ransom demand is $1.7 million. The Salvation Army is not the first ransomware attack on a charitable organization. Earlier this year, Welthungerhilfe, a German non-profit aid organization, received a $2.15 million ransom demand from ransomware group Rhysida. We’ve recorded another 3,955 unconfirmed attack claims made by ransomware groups this year so far that haven’t been acknowledged by the targeted organizations.”

This is particularly bad as the victims in this case are kind of vulnerable and are more likely to be victims of secondary attacks that are launched by threat actors. Hopefully these victims are in a place where they are not taken advantage of.

Dark Web, Ransomware, & Social Engineering – The Europe Regional Threat Landscape Repor

Posted in Commentary with tags on August 29, 2025 by itnerd

Today, SOCRadar published its Europe Regional Threat Landscape Report. This research breaks down what exactly is happening since August 2024 when it comes to dark web, ransomware, and phishing. 

Key Takeaways Include:

  • Finance and Insurance is the top exposed sector on the dark web with 14,08%, and when Commercial Banking and Crypto are added, total financial exposure reaches 22,8%. 
  • Retail and e-commerce follow closely with 19,5%, confirming criminals’ focus on quick monetization. Selling dominates threat categories at 61,93%, while sharing stands at 24,34%, showing that over 70% of activity is trade-driven. 
  • Data leaks remain the most common threat type at 58,23%, with access sales at 21,90%, meaning more than 80% of threats revolve around stolen information and entry points. 
  • At the country level, France (5,62%), the UK (4,89%), and Germany (4,68%) lead in dark web targeting, while ransomware strikes are highest in the UK (22,94%), Germany (16,47%), and France (10,10%). 
  • Ransomware activity is fragmented: Akira (8,7%), Qilin (8,1%), and RansomHub (6,8%) are visible, but smaller groups make up 76,4%. 
  • Phishing shows a different pattern, with Bulgaria (24,26%) and Russia (21,06%) leading. 
  • Information Services (19,77%), National Security & International Affairs (13,31%), and Banking (11,45%) are the main phishing targets.
  • 73,44% of phishing sites use HTTPS, showing how attackers exploit encryption to build trust.

For full details, the Europe Regional Threat Landscape Report can be found at this link: https://socradar.io/wp-content/uploads/2025/08/Europe-Threat-Report.pdf

Wearable Tech: Do They Pose a Privacy Risks?

Posted in Commentary with tags on August 29, 2025 by itnerd

VPN Mentor has a recent report on the privacy risks posed by wearable devices.

Here’s a quick overview of what they uncovered:

  • 90% of 117 wearable devices track health & wellness metrics, making it the most widely monitored category.
  • 63% record location data, either via built-in GPS or connected GPS through a smartphone.
  • 23% of major wearable brands explicitly share or sell personal data to advertisers or marketing partners.
  • 55% share de-identified biometric data with outside researchers.

You can read the full report here: https://www.vpnmentor.com/blog/wearable-tech-privacy-risks-research/

The State of Email Trust: Global DMARC Adoption Trends in Q2 2025

Posted in Commentary with tags on August 29, 2025 by itnerd

By John Wilson, Senior Fellow, Threat Research, Fortra

In the sprawling digital ecosystem of the modern web, trust hinges on invisible scaffolding: DNS configurations, registrar records, and cryptographic signaling that determines whether your inbox will deliver truth or treachery. With phishing, spoofing, and business email compromise continuing to exploit lapses in email authentication, one question looms large: Just how secure are the world’s most-visited domains? 

Armed with DNS records (MX, SPF, DMARC) and whois metadata from the top 10 million domains on the internet, this analysis offers one of the most expansive snapshots of global email hygiene to date. From configuration trends to systemic weak points, we peel back the layers of digital trust to reveal what’s been hiding in plain sight. 

The findings? At once expected and alarming. While many domains have embraced modern security standards, millions remain vulnerable — inviting attackers to impersonate, manipulate, and deceive. By analyzing registrar behavior, domain age, and adoption patterns, we uncover which corners of the internet are actively fortifying their defenses and which have left the door ajar. 

Sender Policy Framework (SPF): Adoption and Pitfalls in the Wild

SPF serves as the internet’s first line of defense against email spoofing, specifying which IP addresses are authorized to send mail on behalf of a domain. But while it’s foundational to email authentication, its real-world implementation varies wildly across the web’s most popular domains.

SPF Adoption at a Glance

Out of the 10 million domains analyzed: 

  • 3,666,641 (36.7%) published a syntactically valid SPF record
  • 140,843 (1.4%) published an SPF record with syntax errors or excessive DNS lookups
  • 6,192,516 (61.9%) had no SPF record at all 

This means that 63.3% of the 10 million most popular domains on the internet remain vulnerable to unauthorized sending and/or delivery issues. 

Common Misconfigurations

Among the domains with SPF records:

  • 110,732 (1.1%) exceeded the 10-DNS-lookup limit, rendering SPF evaluations unreliable. 
  • 4,479 (0.045%) used the `+all` mechanism (i.e., allow all), effectively nullifying the purpose of SPF. Worse, these domains open the door for cybercriminals to hijack the trust inherent in these domains to send phishing links, malware-laden messages, and launch social engineering attacks. Two particularly notable examples were ubuntu.com and civilservice.gov.uk. Imagine how easy it would be to lure UK citizens interested in civil service jobs with an authenticated message from careers@civilservice.gov.uk. Or consider the message below, which I sent to myself using nothing more than telnet: <Image Redacted for Email>
  • 2,632 misspelled the ip4: mechanism either by omitting the “4” or by inserting a “v”. 

DMARC: Visibility, Policy, and Gaps

DMARC builds upon SPF and DKIM to offer domain owners the ability to define how unauthenticated messages should be handled — and to receive reporting data on abuse attempts. It’s a vital control against phishing and brand impersonation, yet widespread adoption remains elusive. 
 

DMARC Adoption Snapshot

From the dataset of 10 million domains:

  • 1,816,866 (18.2%) had a valid DMARC record
  • 1,061,585 (10.6%) had a record with a `p=none` policy, offering visibility but no enforcement
  • 755,281(7.6%) implemented enforcement policies (`p=quarantine` or `p=reject`)
  • 20,384 (0.2%) had malformed or incomplete DMARC entries
  • 8,162,614 (81.6%) lacked a DMARC record entirely 

Despite growing awareness, only 388,096 (3.9%) of the internet’s 10 million most popular domains enforce a reject policy including on subdomains, exposing the remaining domains to spoofing risks even when SPF and DKIM are configured.

Common DMARC Configuration Issues

For domains that published a DMARC record, the most common error was the omission of the mailto: before the rua and/or ruf reporting addresses. The second most common error was misplacement of the policy p= tag, which must occur immediately after the v=DMARC1; tag. 

While not an error, 47.7% of domains with a valid DMARC record did not include a rua tag, meaning those domain owners are not receiving aggregate feedback to enable them to correct any SPF or DKIM configuration issues. 

73% of domains with a valid DMARC record did not include a ruf tag, depriving the domain owner of forensic feedback reports. Forensic reports are helpful to diagnose SPF and DKIM misconfigurations and can also help the domain owner see attempts to hijack their domain in near real time. 

DMARC Provider Correlation to Policy

DMARC records specify the domain owner’s policy for how they would like receivers to treat unauthenticated mail that uses their domain in the “From:” header. There are three DMARC policies:  

  • “None,” which indicates the domain owner would like no special treatment applied to messages which fail authentication.
  • “Quarantine,” which indicates the domain owner would like unauthenticated mail from their domain placed in a quarantine such as a spam folder.
  • “Reject,” which indicates the domain owner would like the receiving organization to block the message outright, typically by issuing a 550 error at the end of the DATA portion of the SMTP transaction. 

Receivers may honor the domain owner’s wishes or may override the sender’s DMARC policy for a variety of reasons specific to the receiving organization. 

For maximum security, domain owners should publish a DMARC reject policy. This is often a difficult task, as it requires the domain owner to ensure that all legitimate email from their domain is properly authenticated with SPF and/or DKIM. The complexities of identifying all third-party senders and then working with those senders to ensure they follow DMARC-compatible authentication practices have led many companies to work with third parties who specialize in DMARC implementation. 

Our analysis of the top 10 million internet domains found that only 22.9% of domains who send their DMARC reporting data to themselves have a DMARC reject policy. 72.8% of domains whose DMARC records point to Fortra, publish DMARC reject policies. The chart below shows the policy breakdown for the major DMARC solution providers. The data suggests that working with a third-party vendor who specializes in DMARC implementations can increase the likelihood of achieving DMARC reject status. 

<Image Redacted for Email>

Conclusions

This analysis of the DNS and email authentication configurations of the top 10 million internet domains reveals both encouraging trends and significant shortcomings in the global state of email security. While the adoption of foundational protocols like SPF and DMARC has increased in recent years, the data shows a concerning level of misconfiguration, underutilization, and overall neglect — leaving the majority of domains vulnerable to spoofing, phishing, and business email compromise. 

While tools and standards exist to dramatically reduce spoofing and phishing risk, their protection is only as good as their implementation. The internet’s most visited domains include both shining examples of secure configuration and gaping vulnerabilities waiting to be exploited. Strengthening global email hygiene requires not only broader adoption of standards like SPF and DMARC, but also a concerted effort to ensure they are implemented correctly — and supported by the right infrastructure, partnerships, and oversight. 

ChatGPT Leaks: The Safety Detectives Analyzed 1,000 Public AI Conversations

Posted in Commentary with tags on August 29, 2025 by itnerd

The Safety Detectives have just published a report with the results of a research we’ve recently conducted focused on the recent leak of thousands of ChatGPT conversations.

While conducting our research they identified some concerning privacy related key points such as:

  • Users are sharing personally identifiable information (PII), sensitive emotional disclosures, and confidential material with ChatGPT.
  • Only around 100 out of 1,000 total chats make up 53.3% of the over 43 million words we analyzed.
  • Some users are sharing full resumes, suicidal ideation, family planning discussions, and discriminatory speech with the AI model.
  • “Professional consultations” account for nearly 60% of the topics flagged.

You can check their full report here: https://www.safetydetectives.com/blog/chatgpt-leaks/

TransUnion Gets Hit By A Data Breach

Posted in Commentary with tags on August 28, 2025 by itnerd

Consumer credit reporting giant TransUnion warns it suffered a data breach exposing the personal information of over 4.4 million people in the United States. According to a filing submitted to the Office of the Maine AG, the breach occurred on July 28, 2025, and was discovered two days later.

Paul Bischoff, Consumer Privacy Advocate at Comparitech had this comment: 

“For context, the TransUnion breach compromised 4.4 million people. The 2017 Equifax breach compromised 147 million. It’s not as big, but it’s just as serious for those 4.4 million people. TransUnion does more than just generate credit reports. Other businesses that suffer data breaches frequently enlist TransUnion to provide credit monitoring and identity theft protection to breach victims. This breach could dissuade victims of other breaches from enrolling in those protective services.”

Roger Grimes, Data-Driven Defense Evangelist at KnowBe4 had this to say:

“Another data breach? “Only” involving single millions of digits? It’s almost a non-event. Data breaches involving hundreds of millions of records barely make the news anymore. How worried can you be about one “little” data breach when the information revealed to the hackers has likely been stolen many times? My only problem is why the breach was confirmed in late July and not reported to consumers until late August? Four weeks to publicly report, while likely legal, seems like a lot of time to let involved compromised users go around blindly without knowing about the additional risk, whether big or small. I’ve seen this lately…data breaches that must be reported publicly, taking a month or many months before they are publicly reported to those who are impacted. In today’s instant online world is seems more and more unacceptable.”

When the company that helps to protect people from getting taken advantage of after a breach gets breached, we’re all in deep trouble. These companies need to ensure that everything they do is beyond reproach or consumers will stop trusting them.