logo
#

Latest news with #PAM

Kuwait Expats Can Now Apply for Exit Permits in English via Sahel App
Kuwait Expats Can Now Apply for Exit Permits in English via Sahel App

Arab Times

timea day ago

  • Business
  • Arab Times

Kuwait Expats Can Now Apply for Exit Permits in English via Sahel App

KUWAIT CITY, June 28: Kuwait has officially introduced the English-language version of its digital exit permit service on the Sahel mobile application, as part of ongoing efforts to streamline labor mobility and enhance government oversight. Starting July 1, 2025, all expatriate employees working in the private sector must obtain an employer-approved exit permit through the Sahel app before leaving the country. The new system applies to holders of Article 18 visas. To initiate the process, users must log in to the Sahel app, navigate to the Services section, and select the Public Authority of Manpower (PAM). Within this section, a link to ' Expatriate Workers Services ' is provided, choose Exit Permit allowing users to input their intended departure and return dates, and submit the request. Once the employer (sponsor) approves the application, a notification will appear in the app. A downloadable and printable version of the approved permit will then be made available to the employee.

Expats Can Now Apply for Exit Permits in English via Sahel App
Expats Can Now Apply for Exit Permits in English via Sahel App

Arab Times

timea day ago

  • Business
  • Arab Times

Expats Can Now Apply for Exit Permits in English via Sahel App

KUWAIT CITY, June 28: Kuwait has officially introduced the English-language version of its digital exit permit service on the Sahel mobile application, as part of ongoing efforts to streamline labor mobility and enhance government oversight. Starting July 1, 2025, all expatriate employees working in the private sector must obtain an employer-approved exit permit through the Sahel app before leaving the country. The new system applies to holders of Article 18 visas. To initiate the process, users must log in to the Sahel app, navigate to the Services section, and select the Public Authority of Manpower (PAM). Within this section, a link to ' Expatriate Workers Services ' is provided, choose Exit Permit allowing users to input their intended departure and return dates, and submit the request. Kindly note exit permits have to be applied between 7 days to 24 hrs. Once the employer (sponsor) approves the application, a notification will appear in the app. A downloadable and printable version of the approved permit will then be made available to the employee.

S'wak govt backs sustainable, innovative devt projects, says Premier
S'wak govt backs sustainable, innovative devt projects, says Premier

Borneo Post

time4 days ago

  • Business
  • Borneo Post

S'wak govt backs sustainable, innovative devt projects, says Premier

Dr Sim (second left) speaks to Adrianta (left) regarding the designs. At right is the competition's convener Amzar Ahmad. KOTA SAMARAHAN (June 25): The Sarawak government will continue to support developments that demonstrate sustainability, inclusivity and innovation, said Datuk Patinggi Tan Sri Abang Johari Tun Openg. The Premier said this is to ensure that the built environment keeps pace with the state's ambitions. 'Architecture sits at the heart of that agenda. We seek buildings and neighbourhoods that nurture biodiversity, embrace smart technology and, above all, put people first,' he said in a speech for the AIR Architecture Competition prize presentation at Hock Seng Lee (HSL) Tower here today. The text of Abang Johari's speech was delivered by Deputy Premier Datuk Amar Dr Sim Kui Hian, who represented him at the event. The Premier said the competition is aligned with the state government's Post Covid-19 Development Strategy 2030, charting a path towards a high-income, green, and digital economy powered by talent and creativity. 'Competitions like AIR push our collective imagination and help translate policy into projects on the ground,' he added. The AIR Architecture Competition involves a 13-acre land between Kuching International Airport and Saradise. It is HSL's second national architecture competition after 'Langit' in 2021, and was jointly organised with the Malaysian Institute of Architects (PAM). HSL is the landowner and promoter of the competition, which is open to PAM members nationwide. Abang Johari also noted the Project AIR tagline, 'The AIR Above Us, Di Bawah AIR Mengalir', as a simple phrase which distils Sarawak's long tradition of living in harmony with nature—from longhouses upriver to the shophouses of the Nanyang style that line old Kuching. 'Great cities grow from great rivers, whether in Kuala Lumpur or here at Kuching. When we design well, we create not merely handsome façades but healthier, happier communities. 'When we build responsibly, we honour our rivers, our forests, and the generations yet to come,' he said, adding it was heartening to see human-centred emphasis in each of the competition's submissions. In this regard, he called on HSL, PAM and the wider design community to share these ideas through public exhibitions, online forums, and academic studios. Also present were HSL managing director Datuk Paul Yu Chee Hoe and PAM president Adrianta Aziz. abang johari Dr Sim Kui Hian innovation sustainability

CyberArk's (CYBR) Price Target Raised to $480 at Jefferies
CyberArk's (CYBR) Price Target Raised to $480 at Jefferies

Yahoo

time20-06-2025

  • Business
  • Yahoo

CyberArk's (CYBR) Price Target Raised to $480 at Jefferies

CyberArk Software Ltd. (NASDAQ:CYBR) is one of the 11 must-buy AI stocks analysts are betting on. On June 16, Jefferies reiterated its Buy rating on the stock and increased the price target to $480 from $430. The adjustment comes as the research firm remains confident about the company's strong positioning in the cyber-attacks market. Den Rise/ According to Jefferies, CyberArk Software has outperformed the overall market with a 16% yearly gain. The impressive run is supported by the company's 35.12% revenue growth and 77.91% gross profit margin, affirming growth. Jefferies expects the company to register significant growth in its annual recurring revenue through new Privileged Access Management (PAM) customers, maintenance conversions, and cross-selling opportunities. The firm also expects the company to achieve free cash flow margins of over 27%. CyberArk Software Ltd. (NASDAQ:CYBR) is a software company specializing in cybersecurity, focusing on Identity Security and Privileged Access Management (PAM). Its solutions help organizations protect their valuable assets by securing access to human and machine identities across various environments. It uses Artificial Intelligence (AI) in its Identity Security Platform to enhance security, efficiency, and user experience. While we acknowledge the potential of CYBR as an investment, we believe certain AI stocks offer greater upside potential and carry less downside risk. If you're looking for an extremely undervalued AI stock that also stands to benefit significantly from Trump-era tariffs and the onshoring trend, see our free report on the best short-term AI stock. READ NEXT: 12 Best Healthcare Stocks to Buy Now and 10 Stocks Analysts Are Upgrading Today. Disclosure: None. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

Multiplayer AI: The New Operating Model For Identity Security
Multiplayer AI: The New Operating Model For Identity Security

Forbes

time18-06-2025

  • Business
  • Forbes

Multiplayer AI: The New Operating Model For Identity Security

Dr. John Pritchard is the Chief Product Officer at Radiant Logic, responsible for the company's global product vision. AI-powered deepfakes and credential attacks are rewriting the rules of cyber risk, with identity-related breaches now costing organizations an average of $4.45 million per incident and accounting for over 70% of successful attacks on enterprise infrastructure and supply chains. Despite record investments in detection and response, breaches keep making headlines. Why? I call this the identity security paradox: More technology doesn't equal protection, especially if tools—and the people and AI agents using them—don't work together. Identity is the primary attack surface in the enterprise. Most organizations built their identity security stack on a traditional combination of IAM, IGA and PAM, but the rapid proliferation of cloud apps, machine identities and AI agents outpace these traditional controls. The result? Siloed data, unmanaged privileged accounts and hidden nonhuman identities—each a potential attack vector. Gartner finds that 65% of organizations still lack IAM maturity, weighed down by technical debt and fragmented architectures. Point solutions deployed to 'fix' audit findings or compliance gaps create more complexity, not less. Attackers exploit these seams, moving laterally between systems and identities that aren't monitored holistically. CISA's Silentshield Red Team Assessment demonstrated that decentralized teams and poor communication allowed adversaries to persist undetected, even when individual groups spotted anomalies. The lesson is clear: Solo efforts—whether a lone expert, an isolated AI agent or a disconnected tool—cannot keep pace with adversaries who are increasingly agile, automated and collaborative. To close these gaps, interoperability must become the standard for tools and the people and AI agents using them. Interoperability means more than connecting dashboards or sharing alerts. It's about ensuring that identity security posture management (ISPM) and identity threat detection and response (ITDR) systems share data, context and workflows in real time, across both human and machine identities. Gartner recommends a 'system of systems' approach, built on identity fabric principles, to support zero trust and intelligent automation. This means breaking down technical and organizational silos so prevention and detection teams operate from a unified, continuously updated single source of truth for identity data—a concept Gartner identifies as foundational for modern identity security. This trusted, authoritative data layer enables faster, more accurate decisions and ensures that every team acts on the same intelligence. When ISPM and ITDR interoperate, and when human and AI teammates collaborate based on shared reference points, blind spots shrink and attackers have fewer seams to exploit. I call the next evolution in identity security: multiplayer AI—intelligent systems designed to amplify human capabilities through enhanced teamwork. Gartner predicts by 2027, 90% of successful AI implementations in cybersecurity will focus on tactical task automation and process augmentation, not full autonomy or staff replacement. Multiplayer AI enables human and AI collaboration, breaking down silos and bridging gaps between prevention and detection. AI excels at analyzing vast datasets, detecting patterns humans miss and automating repetitive processes. Critical decisions, like determining whether anomalies are a threat or false positives, still require human judgment and contextual understanding. Studies show organizations using collaborative AI models—human decisions based on AI recommendations—see faster response times, fewer security incidents and improved resilience. The key is not just technology, but teamwork: AI handles the heavy lift of data processing and pattern recognition, while humans provide creativity, ethical oversight and business context. Thankfully, the industry is moving quickly. With the meteoric rise of agentic AI, open standards like Model Context Protocol (MCP) and Agent2Agent (A2A) are enabling AI agents from different vendors, clouds and frameworks to communicate, share context and coordinate tasks securely. Technology partners including OpenAI, Microsoft and Google are already adopting these protocols, breaking down silos that limit automation's impact. For business leaders, agentic AI means specialized agents for threat detection, access management, compliance and user behavior analytics can now form ad hoc teams-automating complex workflows and adapt to new threats. By 2028, Gartner forecasts multiagent AI will account for 70% of threat detection and response implementations, primarily to augment—not replace—staff. Early adopters will see measurable results: Leveraging agent-to-agent collaboration is predicted to cut attacker dwell time in compromised environments by up to 50%, while accelerating response and reducing operational risk. When humans and AI work together, identity security becomes faster, smarter and more resilient. 1. Establish an interoperability baseline. Audit ISPM and ITDR tools for data sharing and workflow integration across human and machine identities. Ensure architectures support agent-to-agent interoperability using open standards like MCP and A2A, so specialized agents can collaborate and automate cross-vendor workflows. Set quarterly targets to reduce IAM tool integration gaps. 2. Pilot tactical AI augmentation. Start with a focused, data-driven use case, such as automated privilege review or anomaly detection. Track improvement in response time and risk reduction. 3. Build AI literacy and human oversight. Train teams on both the benefits and limits of AI, including where human verification is required in critical workflows. 4. Continuously review identity hygiene. Use AI-driven discovery to identify unused or risky accounts, but require human validation before making changes. Aim to reduce privileged account sprawl and remediate orphaned accounts as they are detected. 5. Measure what matters. Track outcome-driven metrics such as percentage reduction in excessive permissions, improvement in MFA deployment rates and decreased incident response times. For example, reducing excessive permissions by 20% and increasing MFA coverage to 95% of privileged accounts within one year. The next breach won't be stopped by just another dashboard or a new AI agent. Organizations that have achieved true interoperability across tools, teams and AI will be able to respond more accurately to security issues. Multiplayer AI and agent-to-agent collaboration will lead the blueprints for resilience in the age of AI turbulence. Start by assessing your current environment for interoperability gaps, unify your tools and teams and empower your people with AI that amplifies—not replaces—their expertise. In the high-stakes game of identity security, victory belongs to those who play as a team. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store