Enterprise

AI lie detector: How HallOumi’s open-source approach to hallucination could unlock enterprise AI adoption
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More In the race to deploy enterprise AI, one obstacle consistently blocks the path: hallucinations. These fabricated responses from AI systems have caused everything from legal sanctions for attorneys to companies being forced to honor fictitious policies. …

Nearly 80% of Training Datasets May Be a Legal Hazard for Enterprise AI
A recent paper from LG AI Research suggests that supposedly ‘open’ datasets used for training AI models may be offering a false sense of security – finding that nearly four out of five AI datasets labeled as ‘commercially usable’ actually contain hidden legal risks. Such risks range from the inclusion of undisclosed copyrighted material to…

We need to talk about the F word (‘friction’ in enterprise, that is)
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More Today, everything is frictionless. Whether you’re parking your car, selling your home, hitting the drive-thru or drying your hair, there’s a company promising to save you time and eliminate any hassle you might encounter. Frictionlessness is…

Top 7 Enterprise Cybersecurity Challenges in 2025
When was the last “easy” year for enterprise security teams? Certainly not last year, this decade or even this century. Every year in recent memory has seen its share of noteworthy and novel cyberattacks. It doesn’t take a crystal ball to predict 2025 will be more of the same. If anything, the pace and…
_Pablo_Lagarto_Alamy.jpg?disable=upscale&width=1200&height=630&fit=crop&w=600&resize=600,400&ssl=1)
How Nation-State Cybercriminals Are Targeting the Enterprise
COMMENTARY Cyber warfare often mirrors traditional conflict, but as global geopolitical tensions continue to rise, the landscape of nation-state cyber-threat actors has shifted significantly. Recent events have spurred altered tactics, targets, and patterns of state-sponsored cyberattacks. While historically these threat actors focused primarily on critical infrastructure and government entities like energy grids and transportation, today’s nation-state threat actors…

Voice Search Optimization At Scale: A Guide For Enterprise Marketers
Smartphones put the world at our fingertips. People have questions that need answering, as well as the services or products they need. All of these things are just a search away, and now, we’ve seen a cosmic shift from traditional search to voice search and voice assistants. Statistically, voice search and assistants are not something…