A Note from Connect Leadership

Greetings HPE Community Members!

Well, here we are at the end of May and the prospect of Summer ahead of us.  It’s been a busy couple of months for Connect with lots to talk about.

Since my last letter, I started a new role at Everest, Leaders in the global Property & Casualty market with a 50-year track record of excellence in underwriting and customer service. I was putting the final touches together with the BITUG Committee for the E-BITUG and sadly had a bad horse-riding accident that left me with 6 broken ribs and a stint in hospital.

We’ve had April Fool’s day, Ramadan, Passover, and Easter.  The King’s Coronation flew by with the Red Arrows final salute and I missed out on the opportunity to attend and host the E-BITUG due to my injuries.

I hope that you and your families were able to celebrate the events that were precious to you.

We have a packed out read in the Connection this month, with our lead article focusing on Cyber Security.  So, I thought I would continue my History of IT theme and provide you with some interesting facts about the birth of Cyber Security. Did you know …….

The 1940s: The Time Before Cybercrime

Cyberattacks were challenging to execute for about 20 years after the first digital computer was built in 1943.

The 1950s: The Phone Phreaks

Computer information gathering was not the original purpose of hacking. It may be more accurate to say that early telephone use is where computer hacking originated. This became clear in the 1950s when phone phreaking became popular.

The 1960s: All Quiet On the Western Front

Even by the middle of the 1960s, most computers were massive mainframes kept in temperature-controlled, safe environments. Access remained restricted, even for programmers, due to the high expense of these bulky devices.  Most of the development of the phrase “hacking” occurred during this decade. It wasn’t caused by using computers, but rather by certain individuals breaking into high-tech train sets owned by the MIT Tech Model Railroad Club.

The 1970s: ARPANET and the Creeper

The 1970s saw the actual start (and need) of cybersecurity. It was an important decade in the evolution of cyber security. The Advanced Research Projects Agency Network (ARPANET) was the initial endeavour in this. Before the internet was created, this connectivity network was constructed.

The 1980s: The Birth of Commercial Antivirus

High-profile attacks increased in frequency in the 1980s, including those at National CSS, AT&T, and Los Alamos National Laboratory. In the 1983 movie War Games, malicious computer software commands nuclear missile systems while pretending to be a game.

The terms “Trojan Horse” and “computer virus” both made their debut in the same year.

The 1990s: The World Goes Online

The internet saw growth and development of mammoth proportions during the whole decade. Along with it, the cybersecurity sector expanded. Concerns regarding polymorphic viruses started and The DiskKiller malware was introduced by PC Today, a magazine for computer users. Numerous thousand PCs were infected.

(Source: https://www.knowledgehut.com/blog/security/history-of-cyber-security)

So, what will the next quarter bring for us?

We will have HPE Discover to look forward to in June and the lovely sunshine and entertainment factor of Las Vegas! I have to admit that I don’t think I will ever tire of the place.  I am gutted that due to my accident, I am unable to fly to Discover and will miss out on the opportunity of greeting many of you at our booth. Please join us in the booth (DEMO1401 and DEMO1402) for a Connect Tech Forum or some downtime with therapy dogs from Michael’s Angel Paws.

 

Edge to the Cloud is the theme and HPE continues to help you understand the journey to navigate data-first modernization, HPE GreenLake brings the cloud to you. Helping you resolve your data disarray, easing migration headaches & securely connecting your data across the edge to cloud. Opening up opportunities and advancing the way you live and work, HPE GreenLake is hybrid cloud, your way.

September will bring us TBC in Denver – which I am sure many of you are looking forward to alsoPlanning is underway, and you can keep track of the latest developments at www.NonStopTBC.com

As always you can join the conversations in our Slack workspace.  Please enjoy this issue of The Connection and we hope to see you all soon!

Best regards,
Sue Robinson
President
London, UK

Author

  • Sue Robinson

    A forward-thinking, strategic and highly accomplished CIO and Non-Executive Director with over 25 years’ experience as a specialist in the IT industry providing vision and leadership focusing on Information Risk Management, Business Change and Operations, Service Delivery & Management, Technology and Security. Talented at leading teams to success with a proven track record of planning and implementing transformational change across infrastructure and business systems, with an impressive career history spanning several notable technology timelines and multinational organisations. With particular emphasis on producing infrastructure to support business operations that improve cost effectiveness and service quality. A Non-Executive Director for Connect Worldwide, a global HPE User Community Forum and public speaker, delivering talks and presentations at a number of international events covering Women in Technology & Regulatory Compliance. Consistently featured blogger on the CIO Talk Network (CTN), delivering quarterly blogs.

Be the first to comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.