article thumbnail

Ethics of AI in CX

Zendesk

Research any AI technology before you use it to ensure it provides sufficient cybersecurity measures (depending on where you operate). Do you define creditworthiness as someone more likely to repay a loan or optimize it to maximize profit? The example Fischer gives is a chatbot for creditworthiness.

article thumbnail

Top 50 AI Companies in SaaS (2020 Edition)

SmartKarrot

With the influence of AI, it not only makes all its services more beneficial for the user but also generates huge productivity profits from them. Discovering the novel scope of AI in cybersecurity, Sophos is using AI capabilities to achieve information security goals. Google can easily claim to have SaaS built into its DNA. Proofpoint.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Top 50 AI Companies in SaaS (2020 Edition)

SmartKarrot

With the influence of AI, it not only makes all its services more beneficial for the user but also generates huge productivity profits from them. Discovering the novel scope of AI in cybersecurity, Sophos is using AI capabilities to achieve information security goals. Google can easily claim to have SaaS built into its DNA. Proofpoint.

article thumbnail

7 Key C-Suite Roles in a Truly Customer-Centric Executive Team?

SmartKarrot

The CCO role leads to increased profit, higher revenue, reduced costs, and customer retention. Government, banking, and insurance are the sectors with CDOs. The chief security officer is the seniormost employee in a company responsible for creating a strong, secure framework for business operations and cybersecurity policies.

article thumbnail

7 Key C-Suite Roles in a Truly Customer-Centric Executive Team?

SmartKarrot

The CCO role leads to increased profit, higher revenue, reduced costs, and customer retention. Government, banking, and insurance are the sectors with CDOs. The chief security officer is the seniormost employee in a company responsible for creating a strong, secure framework for business operations and cybersecurity policies.