logo
New AI committee to guide digital future of Oman

New AI committee to guide digital future of Oman

Zawya15-05-2025

Muscat – Ministry of Transport, Communications and Information Technology (MTCIT) has formed a national committee of artificial intelligence specialists from both the public and private sectors to advance the sultanate's AI agenda in line with Oman Vision 2040 and the country's digital transformation strategy.
The committee has been tasked with guiding national efforts to integrate AI into key sectors such as education, healthcare, logistics, finance and public services. Acting as a national think tank, it will provide expert insights on emerging AI technologies and their practical applications in addressing real-world challenges.
A ministry official said the committee's responsibilities include advising the government on AI policies, developing education and training programmes, and reviewing existing legislation related to AI. The committee will also recommend measures to enhance Omani expertise in AI, propose updates to regulatory frameworks, and monitor global AI developments to assess their impact on the sultanate.
A significant part of its mandate involves addressing the ethical aspects of AI, including guidelines for transparency, accountability and data protection. These guidelines will reflect Omani cultural values while aligning with international standards.
In addition, the committee will shape frameworks for AI-related education and research collaborations with international institutions. It will also identify sectors with high potential for AI-driven economic diversification and prepare strategic roadmaps to support public-private partnerships aimed at accelerating AI adoption in the sultanate.
The committee is expected to evaluate potential risks, such as algorithmic bias and misuse of personal data, to promote responsible innovation and safeguard society.
Chaired by Dr Ahmed Saeed al Ma'ashari, Assistant Professor at College of Engineering in Sultan Qaboos University, committee members include Ibrahim Abdullah al Hosni from Oman Chamber of Commerce and Industry, Ghada Nasser al Kharousi from Central Bank of Oman, Mahmoud Nasser al Nafei from Invospark, Dr Riyadh Abdul Aziz al Balushi from Decree Company, Dr Younis Saeed al Anqoudi from Transom Handling, and Tawwa Abdullah al Dawood from MTCIT.
Formation of the committee comes as Oman seeks to position AI as a cornerstone of its National Digital Economy Programme. MTCIT aims to improve and unify the country's AI efforts under a coordinated national strategy, ensuring Oman is well-prepared to leverage future technologies while managing related risks responsibly.
© Apex Press and Publishing Provided by SyndiGate Media Inc. (Syndigate.info).

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

India Leads World in Generative AI Take‑Up
India Leads World in Generative AI Take‑Up

Arabian Post

time25 minutes ago

  • Arabian Post

India Leads World in Generative AI Take‑Up

Over ninety per cent of employees in India use generative artificial intelligence tools at work, with 92 per cent logging daily use, according to a recent report by the Boston Consulting Group. This figure places India well above the global average of about 72 per cent. The BCG study, based on a survey of 10,600 workers across 11 countries, highlights India's prominence in integrating generative AI. Alongside this, some 17 per cent of workers report that their organisations have embedded AI agents into daily workflows, ranking India among the top three nations globally for such integration. High adoption has come with heightened concern. Nearly half of Indian employees—48 per cent—believe their roles are at risk of disappearing within the next decade due to AI, outpacing global levels at 41 per cent. Anxiety is compounded by low levels of understanding and guidance: only 33 per cent say they comprehend how AI agents function, while just 36 per cent feel they have received adequate training. ADVERTISEMENT Despite these concerns, AI is delivering tangible productivity benefits. Almost half of Indian users report saving more than an hour per day through AI assistance, yet only one‑third receive support in leveraging that time for strategic tasks. Workflow redesign is emergent as a key differentiator: companies that pivot beyond tool deployment to reengineer tasks, offer structured training, and secure leadership backing are achieving stronger outcomes. Experts cite several critical enablers for successful AI adoption. In‑person upskilling, access to approved AI platforms, and visible executive endorsement dramatically enhance uptake. In fact, where frontline workers report robust leadership support, regular usage jumps from 41 per cent to 82 per cent. Security and governance issues remain pressing. About 46 per cent of workers worry that AI decisions lack sufficient human oversight, 35 per cent fear bias or unfairness, and 32 per cent question accountability for errors. Parallel research highlights that 92 per cent of executives flag security vulnerabilities—ranging from cyber‑attacks to data privacy—as major hurdles in AI implementation. India's trajectory is supported by robust public and private investment. The UN Trade and Development's 2025 Technology and Innovation Report names India tenth globally in private‑sector AI investment. Infrastructure initiatives, such as the IndiaAI Mission's goal to build one of the world's largest AI compute networks by 2027, are bolstered by efforts from academia and industry. Centres of excellence at institutions like IIT Delhi and IIIT Hyderabad, alongside corporate alliances, are driving innovation and applied AI solutions. AI's impact is felt across sectors. In public services, digital infrastructure and chatbots are enhancing citizen access. In agriculture, finance and healthcare, predictive analytics and generative AI are reshaping service delivery. Private‑sector growth projections suggest India's AI services market could reach up to US $17 billion by 2027. Nonetheless, workforce readiness remains uneven. While 74 per cent of participants in a Microsoft‑sponsored skills programme hailed from smaller towns—and 65 per cent were women—skilling delivery is uneven, with many employees still left to self‑learn or rely on unauthorised tools. For companies seeking competitive edge, the insight is clear: widespread tool usage alone does not guarantee impact. Only by pairing AI with thoughtful workflow redesign, ethical governance and targeted training can businesses capture the full value of generative intelligence.

Business-critical mails in spam folders: Why real emails look fake now
Business-critical mails in spam folders: Why real emails look fake now

Zawya

timean hour ago

  • Zawya

Business-critical mails in spam folders: Why real emails look fake now

In the fight against phishing, forward-thinking organisations are winning. But there's a twist. The heightened vigilance that has empowered employees to detect suspicious emails is now creating a new dilemma: legitimate, business-critical messages are being flagged, ignored, or buried in spam folders. And in today's AI-fuelled cyber landscape, that reaction may be as justified as it is damaging. Phishing works and it's reshaping trust The release of generative AI tools has supercharged phishing attempts. KnowBe4's Phishing Threat Trend Report 2025 ( shows that more than 80% ( of the analysed phishing emails were augmented by AI, and they're far more convincing than before. 'The gut-check we used to rely on has been gamed – and even the large language models now being explored to help detect suspicious emails are also struggling,' says Anna Collard, SVP of Content Strategy&Evangelist at KnowBe4 Africa. 'They're forced to dig deeper, assessing tone, context, and subtler red flags.' The result? Suspicion is now the default And it's not unwarranted. Maturing cybersecurity awareness and phishing simulation programs have helped sharpen employees' scepticism ( But this success has revealed a new problem: overcorrection. Emails that are real – from HR, IT, legal, or sales – are now increasingly being misjudged. In some cases, they're wrongly flagged as phishing by either people or systems. In others, they're simply ignored. The irony is that some of the most common and legitimate corporate communication traits are now the very ones that raise red flags: Urgency: 'Sign this by COB today'; or when every email from a colleague is marked 'urgent' Unexpected senders: e.g. HR tools or SaaS platforms Calls to action: 'Click here to confirm' Stylistic quirks: overly polished copy, too many links or bold phrases Tech misalignments: emails from legitimate senders failing DMARC or DKIM checks 'Even just using a third-party sender domain can cause confusion,' says Collard. 'If staff don't expect it – or don't recognise the platform – the message can get flagged.' For good reason too, as according to KnowBe4's Phishing Threat Trend Report ( the top 5 legitimate platforms used to send out phishing emails include popular business tools such as DocuSign, Paypal, Microsoft, Google Drive, and Salesforce. The cost of false positives When real emails get sidelined, the impact is more than a missed message. Delayed IT updates, ignored HR deadlines, and lost sales opportunities can create serious ripple effects across operations. Deliverability issues also erode trust. And in high-stakes environments like healthcare, legal services or finance, false positives can become costly very quickly. So, how do you write emails that get read – not flagged? To combat this growing challenge, organisations need to stop thinking of phishing risk as purely a recipient problem. Legitimate internal emails need to look legitimate too. Here's how every team – from HR to IT to marketing – can write more trustworthy emails: Write Like a Human, Deliver Like a Pro Subject lines should set expectations Use clear, predictable language. Instead of 'IMPORTANT: Read this now!', try 'Reminder: Benefits enrollment closes Friday'. Lead with context before asking for action Start with a reference point: 'You recently submitted a travel claim...' or 'As part of your onboarding...'. Limit urgency to what's truly urgent Too many 'ASAP's will breed indifference. Use urgency sparingly – and explain why it matters. Remember: If everything is urgent; nothing is. Minimise links and avoid vague CTAs Avoid phrases like 'click here' or hyperlinking whole sentences. Provide a fallback path: 'Or log into your dashboard directly ( Be cautious with tone and formatting Avoid shouty subject lines, gimmicky language, or inconsistent formatting that can trigger filters. Test before sending Run your email through spam-filter testing tools to see what might flag it ( or Get your digital paperwork in order Even the best-written email may never reach its recipient if your authentication protocols aren't properly configured. SPF, DKIM, and DMARC are three essential technical settings that help prove your email really came from your domain. SPF tells email providers which servers are allowed to send emails using your domain name — helping stop spammers from pretending to be you. DKIM adds a digital signature to your emails to prove they really came from you and weren't changed along the way. DMARC brings SPF and DKIM together by setting rules for what to do with suspicious emails (like send them to spam or block them) and sends reports to your IT team so they can spot abuse. 'These protocols are a bit like a digital passport,' Collard explains. 'Without them, even a genuine email may not make it through.' But even technically sound emails can fall flat if they don't look legitimate to the reader. That's why it's just as important to consider how your internal teams craft and send messages. Internal brand security: don't just train recipients – train senders too Cyber awareness is often focused on detection. But to maintain deliverability and trust, sender behaviour matters too. Teach teams to avoid accidental red flags. Share templates and subject line guides. And ensure that employees – especially those sending to large groups – understand the basics of trustworthy communication. Consistency is key. Make sure communications come from the same official addresses, follow familiar formats, and maintain a recognizable tone. This teaches recipients what to expect – and what to be cautious of – building a clearer line between legitimate messages and possible fakes. 'This is part of internal brand hygiene,' says Collard. 'When your team consistently communicates clearly and predictably, you build trust over time – with both employees and clients. That trust makes your emails easier to recognise, safer to deliver, and more likely to be opened.' In a world where AI can impersonate your tone and template with ease ( your best defence is to sound like yourself – and help others know what to expect when you speak. Distributed by APO Group on behalf of KnowBe4. Contact details: Anne Dolinschek KnowBe4 Email: anned@ TJ Coenraad Red Ribbon Email: tj@

Why e& believes Network as a Service (NaaS) is the foundation of Middle East digital transformation
Why e& believes Network as a Service (NaaS) is the foundation of Middle East digital transformation

Arabian Business

timean hour ago

  • Arabian Business

Why e& believes Network as a Service (NaaS) is the foundation of Middle East digital transformation

Legacy networks are holding the Middle East back. NaaS could be the reset. Across the Middle East, government-led transformation agendas such as Saudi Arabia's Vision 2030 and the UAE's Digital Government Strategy are fuelling large-scale investments in smart infrastructure – from cloud-native public services to AI-enabled mobility and energy systems. These strategies aim to diversify economic activity, modernise national industries, and establish regional leadership in sectors such as AI, cybersecurity, and advanced connectivity. But while these plans gain global attention, the technological foundations behind them often lag. Beneath the surface of digital progress lies a critical weak point: outdated, inflexible network infrastructure that struggles to meet today's connectivity, security, and performance requirements. This hidden vulnerability risks undermining the speed and success of regional transformation. In its latest B2B white paper, The Value of Network as a Service (NaaS), e& UAE, the flagship telecom arm of global technology group e& explains why traditional network models are reaching their limits. Businesses relying on fixed, hardware-heavy networks are encountering scalability issues, security gaps, and operational inefficiencies. Meanwhile, organisations moving to as-a-service models are seeing faster rollouts, leaner operations, and more resilient architectures. NaaS – Network as a Service – is a new approach to enterprise connectivity. It replaces physical ownership with service-based delivery, allowing organisations to consume networking on demand. This means predictable costs, scalable capacity, integrated security, and less time spent on maintenance. For Middle Eastern businesses navigating regulatory change, hybrid work, and AI adoption, this model is not just helpful. It's critical. Why traditional networks fall short e& highlights the most pressing challenges that legacy networks pose: Performance lag: Older networks were designed for static workloads and on-premise environments. They lack the dynamic capacity and intelligent traffic routing needed for today's high-bandwidth workloads like 4K video conferencing, real-time collaboration tools, cloud analytics, and AI inference engines. The result is frequent latency spikes, service degradation, and unplanned downtime that impacts user productivity and customer experience. Cost overhead: Legacy infrastructure is not only outdated – it's expensive to maintain. IT departments spend disproportionate time and resources on managing obsolete switches, patching unsupported software, and manually troubleshooting disparate systems. Gartner reports that as much as 50% of enterprise IT budgets are tied up in this upkeep, diverting investment from strategic initiatives. Slow response times: When businesses need to open a new branch, scale operations, or onboard new applications, legacy systems become a roadblock. Provisioning delays, vendor lead times, and manual configuration processes can delay deployments by weeks or even months. This lack of agility puts businesses at a disadvantage in fast-moving markets. Security exposure: Traditional network security relied on perimeter defence – keeping threats out of a defined zone. But in a world of hybrid work, cloud services, and mobile access, that model is no longer viable. Legacy networks can't enforce user-specific policies, monitor east-west traffic, or support modern frameworks like Zero Trust or SASE. Lack of interoperability: Enterprises today rely on a blend of public and private cloud, SaaS platforms, and third-party integrations. Legacy networks, often built on proprietary systems, struggle to connect these components. This leads to fragmented data flows, siloed systems, and complex workarounds that drain IT bandwidth. Regulatory strain: Governments across the Middle East are tightening data governance rules, requiring more granular control over where data flows, how it's accessed, and who sees it. Legacy networks lack the visibility and programmability to meet these requirements, exposing organisations to compliance gaps and regulatory risk. Legacy networks may have once been enough. Today, they're a liability – delaying innovation, reducing competitiveness, and inflating operational costs. What NaaS delivers to modern enterprises Network as a Service allows businesses to subscribe to secure, software-defined connectivity. It eliminates the need to build and maintain infrastructure in-house. Core advantages include: Rapid deployment: Network changes that once required extensive planning, hardware procurement, and manual setup can now be rolled out in hours – sometimes minutes. This enables rapid site expansion, product launches, and real-time reconfiguration without business disruption. Simplified management: NaaS centralises control with intuitive dashboards and programmable APIs, giving IT teams visibility across the entire network. Real-time analytics, proactive alerts, and one-click policy enforcement reduce human error and increase responsiveness. Cost control: With a pay-as-you-go pricing model, NaaS allows businesses to align networking spend directly with usage. This eliminates the need for over-provisioning, reduces CapEx risk, and supports more agile budgeting cycles. Resilience and uptime: Built-in redundancies – such as dynamic routing, path optimisation, and failover protocols – enable consistent uptime. Many providers offer guaranteed SLAs to ensure reliability across multi-site or mission-critical environments. Security by design: Unlike bolt-on security solutions, NaaS integrates SASE, identity management, and threat detection into the network fabric itself. This allows secure access for distributed users while enforcing consistent policy across endpoints, devices, and clouds. Scalability on demand: Whether onboarding new branch locations, scaling cloud usage, or responding to a spike in application traffic, NaaS supports elastic growth. Capacity can be adjusted in real time – without physical infrastructure changes – making it ideal for enterprises in fast-moving or seasonal markets. By transferring infrastructure responsibilities to service providers, businesses can free up internal teams to focus on innovation, compliance, and customer experience. Why e& stands out in the region As one of the most established tech groups in the Middle East, e& UAE is helping governments, enterprises, and industries transition from legacy networks to future-ready platforms. The white paper lays out what makes its NaaS offering distinct: Standards-led design: Using the MEF NaaS Industry Blueprint ensures global interoperability and vendor-agnostic integration. This allows businesses to operate across multicloud environments, regional jurisdictions, and partner ecosystems without being locked into proprietary architectures. API orchestration: Lifecycle Service Orchestration (LSO) integrates seamlessly with enterprise systems and DevOps pipelines, enabling real-time provisioning, dynamic policy updates, and automated fault recovery – cutting operational lead times by up to 80%. Sustainability-first approach: Deploying Ericsson AIR 3229 dual-band radios has not only reduced energy use by up to 20% but also lowered tower load by 25%, aligning with the region's rising ESG compliance benchmarks and national sustainability goals. AI-driven automation: AI-powered analytics and self-healing network capabilities enable proactive issue detection, traffic optimisation, and autonomous remediation. This leads to improved uptime, reduced operational overhead, and better user experiences. Investment in Aduna: As a founding partner in Aduna – a global network API initiative led by Ericsson – e& empowers developers to programmatically control network features like quality of service, slicing, and edge performance across carrier-grade infrastructure. Expert support: With regionally based network engineers and AI-enhanced support tools, e& delivers end-to-end service assurance – from solution design and deployment to 24/7 operations, dedicated SLAs, and continuous performance optimisation. This approach delivers more than technology – it delivers a partner with the resources, standards, and expertise to support real transformation. Why NaaS is resonating now Several intersecting trends are driving urgency around NaaS in the region: AI deployments are scaling up: Generative AI, machine learning, and edge inference workloads are becoming central to enterprise strategy across sectors including finance, healthcare, logistics, and public services. These systems require ultra-low latency, real-time data processing, and bandwidth-hungry infrastructure – all of which legacy networks struggle to support. NaaS enables AI-driven operations with dynamic provisioning, network segmentation, and workload-aware routing. New regulatory frameworks: Governments across the GCC are introducing more sophisticated laws around data protection, sovereignty, and digital identity. UAE's PDPL and Saudi Arabia's Cloud Computing Regulatory Framework are just two examples that demand fine-grained, policy-driven control. NaaS enables enterprises to embed compliance directly into network operations, reducing audit overhead and enhancing transparency. Cloud maturity: Enterprises are moving beyond basic cloud storage or SaaS adoption toward full cloud-native operations. According to IDC, by 2027, 70% of global enterprises will run containerised, multicloud networks spanning on-prem, edge, and public cloud. NaaS supports this evolution by integrating with orchestration tools and enabling unified visibility and control across fragmented environments. Environmental pressure: Network infrastructure is a major contributor to digital energy consumption, particularly in sectors scaling data centres, IoT, and AI workloads. Regulators and ESG-conscious investors are demanding greener operations. NaaS, with its virtualised model and vendor-managed optimisation, reduces the physical footprint and energy intensity of network infrastructure. Financial scrutiny: In an era of cautious capital spending, CIOs are under pressure to justify every investment. NaaS shifts spending from CapEx to OpEx, offers usage-based pricing, and speeds up time-to-value. It also reduces the total cost of ownership (TCO) by eliminating hidden maintenance, upgrade, and staffing costs tied to legacy systems. For enterprises under pressure to innovate while managing risk, NaaS offers a way to do both. Five takeaways for Middle East enterprises Legacy networks are increasingly incompatible with national digital goals. As Middle Eastern governments pursue AI, smart city, and e-government ambitions, traditional network infrastructures are proving inadequate. Their inability to support real-time data flows, elastic compute, and secure cloud access directly contradicts the objectives of regional digital transformation programmes. NaaS enables secure, scalable connectivity without the capital drag. By shifting from hardware ownership to service consumption, enterprises gain access to state-of-the-art networking without the upfront investment. This unlocks faster time-to-value, reduces technical debt, and ensures flexibility in fast-changing business environments. Real-time compliance, governance, and analytics are built-in – not bolted on. NaaS integrates monitoring, policy enforcement, and data protection into the network's core. This allows IT teams to enforce compliance across multicloud environments and adapt quickly to regulations such as GDPR, UAE PDPL, and sector-specific mandates. e& is shaping the region's NaaS future with standards, automation, and AI. Leveraging MEF blueprints, AI-driven orchestration, and investments in API-based infrastructure through ventures like Aduna, e& is delivering a programmable, highly interoperable network architecture tailored for the region's unique regulatory and operational needs. Now is the moment to shift: delaying means risking competitiveness and compliance. Early adopters are already benefiting from lower costs, stronger security, and greater agility. Businesses that delay risk being constrained by legacy systems as peers move ahead with scalable, intelligent networks designed for the cloud and AI era. A smarter way to network In a digital-first economy, the network is not just a utility – it's a strategic asset. e&'s white paper makes a compelling case: NaaS is no longer optional. It's a business imperative. Enterprises that want to lead in AI, cloud, and smart city development need modern, flexible infrastructure. With regional understanding and global alignment, e& is positioned to help Middle East businesses rewire for resilience, scale, and sustainable growth.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store