LmCast :: Stay tuned in

Aligning VMware migration with business continuity

Recorded: Nov. 26, 2025, 1:02 a.m.

Original Summarized

Aligning VMware migration with business continuity | MIT Technology Review

You need to enable JavaScript to view this site.

Skip to ContentMIT Technology ReviewFeaturedTopicsNewslettersEventsAudioMIT Technology ReviewFeaturedTopicsNewslettersEventsAudioSponsoredComputingAligning VMware migration with business continuityCyber incidents now outpace natural disasters, forcing IT leaders to rethink recovery as a daily operating capability.
By MIT Technology Review Insightsarchive pageNovember 25, 2025In partnership withPresidio For decades, business continuity planning meant preparing for anomalous events like hurricanes, floods, tornadoes, or regional power outages. In anticipation of these rare disasters, IT teams built playbooks, ran annual tests, crossed their fingers, and hoped they’d never have to use them. In recent years, an even more persistent threat has emerged. Cyber incidents, particularly ransomware, are now more common—and often, more damaging—than physical disasters. In a recent survey of more than 500 CISOs, almost three-quarters (72%) said their organization had dealt with ransomware in the previous year. Earlier in 2025, ransomware attack rates on enterprises reached record highs. DOWNLOAD THE ARTICLE Mark Vaughn, senior director of the virtualization practice at Presidio, has witnessed the trend firsthand. “When I speak at conferences, I’ll ask the room, ‘How many people have been impacted?’ For disaster recovery, you usually get a few hands,” he says. “But a little over a year ago, I asked how many people in the room had been hit by ransomware, and easily two-thirds of the hands went up.” Download the full article.
This content was produced by Insights, the custom content arm of MIT Technology Review. It was not written by MIT Technology Review’s editorial staff. This content was researched, designed, and written by human writers, editors, analysts, and illustrators. This includes the writing of surveys and collection of data for surveys. AI tools that may have been used were limited to secondary production processes that passed thorough human review. by MIT Technology Review InsightsShareShare story on linkedinShare story on facebookShare story on emailPopularWe’re learning more about what vitamin D does to our bodiesJessica HamzelouHow AGI became the most consequential conspiracy theory of our timeWill Douglas HeavenOpenAI’s new LLM exposes the secrets of how AI really worksWill Douglas HeavenMeet the man building a starter kit for civilizationTiffany NgKeep ReadingMost PopularWe’re learning more about what vitamin D does to our bodiesThe sunshine vitamin could affect your immune system and heart health.
By Jessica Hamzelouarchive pageHow AGI became the most consequential conspiracy theory of our timeThe idea that machines will be as smart as—or smarter than—humans has hijacked an entire industry. But look closely and you’ll see it’s a myth that persists for many of the same reasons conspiracies do.
By Will Douglas Heavenarchive pageOpenAI’s new LLM exposes the secrets of how AI really worksThe experimental model won't compete with the biggest and best, but it could tell us why they behave in weird ways—and how trustworthy they really are.
By Will Douglas Heavenarchive pageMeet the man building a starter kit for civilizationMarcin Jakubowski is compiling a DIY set of society’s essential machines and making it open-source.
By Tiffany Ngarchive pageStay connectedIllustration by Rose WongGet the latest updates fromMIT Technology ReviewDiscover special offers, top stories,
upcoming events, and more.Enter your emailPrivacy PolicyThank you for submitting your email!Explore more newslettersIt looks like something went wrong.
We’re having trouble saving your preferences.
Try refreshing this page and updating them one
more time. If you continue to get this message,
reach out to us at
customer-service@technologyreview.com with a list of newsletters you’d like to receive.The latest iteration of a legacyFounded at the Massachusetts Institute of Technology in 1899, MIT Technology Review is a world-renowned, independent media company whose insight, analysis, reviews, interviews and live events explain the newest technologies and their commercial, social and political impact.READ ABOUT OUR HISTORYAdvertise with MIT Technology ReviewElevate your brand to the forefront of conversation around emerging technologies that are radically transforming business. From event sponsorships to custom content to visually arresting video storytelling, advertising with MIT Technology Review creates opportunities for your brand to resonate with an unmatched audience of technology and business elite.ADVERTISE WITH US© 2025 MIT Technology ReviewAboutAbout usCareersCustom contentAdvertise with usInternational EditionsRepublishingMIT Alumni NewsHelpHelp & FAQMy subscriptionEditorial guidelinesPrivacy policyTerms of ServiceWrite for usContact uslinkedin opens in a new windowinstagram opens in a new windowreddit opens in a new windowfacebook opens in a new windowrss opens in a new window

Aligning VMware Migration with Business Continuity: A Response

This article, produced by MIT Technology Review Insights in partnership with Presidio, addresses a critical shift in IT disaster recovery planning. For decades, business continuity strategies centered on preparing for physical disasters like hurricanes and floods. However, the surge in cyber incidents, particularly ransomware attacks, has dramatically altered this landscape, rendering cyber threats a more frequent and impactful concern than traditional natural events. The survey data highlights a sobering reality: over 72% of CISOs reported dealing with ransomware in the previous year, a number significantly higher than those impacted by physical disasters.

Mark Vaughn, senior director of the virtualization practice at Presidio, illustrates this change by noting a stark difference in audience response when asking about ransomware versus physical disaster recovery. Initially, only a small faction of attendees would raise their hands in response to the former, while a substantial portion—over two-thirds—would do so when asked about ransomware. This demonstrates the growing prevalence and seriousness with which organizations now view cyberattacks.

The core argument presented is that IT teams must proactively align VMware migration strategies with comprehensive business continuity plans, specifically designed to mitigate the risks associated with increasingly frequent and damaging cyber incidents. The article does not explicitly offer technical solutions or a step-by-step process, instead focusing on the fundamental need to re-evaluate and adapt disaster recovery protocols to account for the evolving threat landscape. The article’s data underscores a crucial adjustment: organizations are no longer simply responding to physical disasters, but actively preparing for, and recovering from, attacks. The emphasis is on recognizing the urgency of integrating cybersecurity into core business continuity strategies, acknowledging that ransomware is now a leading cause of disruption and loss for enterprises.