Business Continuity Management / Disaster Recovery , Cybercrime , Cybercrime as-a-service

How to Keep Business Flowing During a Ransomware Attack

VMware Security GM Kal De on What Gets Overlooked in Ransomware Defense Strategies
Kal De, general manager, VMware Security Business Unit

Time is money, and at no time is that adage more apparent than following a ransomware attack, where every second of downtime costs businesses in industries such as retail and e-commerce large sums of cash. Business continuity is therefore vital even before determining whether ransomed data or systems can be recovered, says Kal De, general manager of VMware's security business unit.

See Also: Critical Condition: How Qilin Ransomware Endangers Healthcare

In a video interview with Information Security Media Group at RSA Conference 2022, De also discusses:

  • What businesses overlook around ransomware defense;
  • Top business continuity challenges following a ransomware attack;
  • Why network and endpoint visibility is needed for true XDR.

De is responsible for defining VMware's security strategy. Previously, he served as vice president of engineering focused on VMware Carbon Black Cloud and as the vice president of research and development for VMware's cloud management business unit. De has also held roles overseeing product strategy and engineering at technology companies including Docker, Hewlett-Packard and Oracle.


About the Author

Michael Novinson

Michael Novinson

Managing Editor, Business, ISMG

Novinson is responsible for covering the vendor and technology landscape. Prior to joining ISMG, he spent four and a half years covering all the major cybersecurity vendors at CRN, with a focus on their programs and offerings for IT service providers. He was recognized for his breaking news coverage of the August 2019 coordinated ransomware attack against local governments in Texas as well as for his continued reporting around the SolarWinds hack in late 2020 and early 2021.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.