{"id":54218,"date":"2026-03-28T18:09:51","date_gmt":"2026-03-28T18:09:51","guid":{"rendered":"https:\/\/eduzim.co.zw\/news\/?p=54218"},"modified":"2026-03-28T18:09:51","modified_gmt":"2026-03-28T18:09:51","slug":"huawei-sa-warns-ai-is-empowering-cybercriminals-as-fast-as-it-is-defenders","status":"publish","type":"post","link":"https:\/\/eduzim.co.zw\/news\/2026\/03\/28\/huawei-sa-warns-ai-is-empowering-cybercriminals-as-fast-as-it-is-defenders\/","title":{"rendered":"Huawei SA Warns AI Is Empowering Cybercriminals as Fast as It Is Defenders"},"content":{"rendered":"<p>\n<\/p>\n<div>\n<p>Artificial intelligence is simultaneously powering sophisticated cyberattacks and the defenses against them, creating an escalating security challenge for organizations across sectors including education, healthcare and finance, Huawei South Africa executives warned this week.<\/p>\n<p>Speaking at the Huawei South Africa IP Club 2026 event in Johannesburg, Kui Zheng, CEO of Huawei Enterprise South Africa, said AI is transforming industries at pace but introducing new risks in the process. \u201cThe technology enables cyber criminals to attack faster and with more sophistication,\u201d Zheng said, adding that traditional security practices and solutions can no longer guard against these threats.<\/p>\n<p>Yanjun Yu, senior principal architect at Anshi Lab, Edison Research Centre, Huawei Canada Research Institute, described agentic AI as the most significant disruption in cybersecurity to date. \u201cIt is a double-edged sword. The technology is used to launch autonomous attacks for criminal gain, but is also used for autonomous defence for organisational protection,\u201d he said. \u201cIdentity is the new perimeter.\u201d<\/p>\n<p>Yu said the overall objective of deploying AI security technology is to make attacks too costly and too risky for threat actors, pushing them to target less-protected organizations instead.<\/p>\n<p>He also flagged quantum computing as an emerging threat, warning of a strategy he described as \u201charvest now, decrypt later\u201d \u2014 in which attackers steal encrypted data today and hold it until quantum computing power is sufficient to break the encryption. \u201cBy 2030, the quantum threat will be very real,\u201d Yu said, cautioning that organizations underestimate the pace of quantum computing\u2019s maturation. \u201cBut there is opportunity within this crisis, and organisations can strengthen their resilience by embracing agility and finding trustworthy partners.\u201d<\/p>\n<p>Mpolokeng Marakalla, chief technology officer for enterprise business commercial market and distribution at Huawei South Africa, said the company works with customers across government, healthcare, retail, education, production, hospitality and finance. He said Huawei\u2019s approach is to first identify a client\u2019s business requirements and challenges before recommending solutions.<\/p>\n<p>Huawei highlighted its Xinghe AI SASE \u2014 secure access service edge \u2014 solution as a key offering for organizations in vertical markets seeking to strengthen network security as the foundation of digital operations. The company also pointed to campus networks entering the Wi-Fi 7 era and surging data center construction as key business opportunities linked to digital transformation.<\/p>\n<\/div>\n<p>\n<script data-jetpack-boost=\"ignore\" async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-1669381584671856\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- Africa tv video display -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-1669381584671856\"\r\n     data-ad-slot=\"3579572842\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script data-jetpack-boost=\"ignore\">\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script><br \/>\n#Huawei #Warns #Empowering #Cybercriminals #Fast #Defenders<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Artificial intelligence is simultaneously powering sophisticated cyberattacks and the defenses against them, creating an escalating security challenge for organizations across&hellip;<\/p>\n","protected":false},"author":1,"featured_media":54219,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32,11],"tags":[9531,9897,1950,3629,4186,787],"class_list":["post-54218","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mzansi","category-world","tag-cybercriminals","tag-defenders","tag-empowering","tag-fast","tag-huawei","tag-warns"],"_links":{"self":[{"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/posts\/54218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/comments?post=54218"}],"version-history":[{"count":1,"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/posts\/54218\/revisions"}],"predecessor-version":[{"id":54220,"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/posts\/54218\/revisions\/54220"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/media\/54219"}],"wp:attachment":[{"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/media?parent=54218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/categories?post=54218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/tags?post=54218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}