Cyber Security Articles & News

Five cyber films of 2016

Zero Days:

Documentarian Alex Gibney offers a chilling account of the Stuxnet worm attack that temporarily sabotaged Iran's nuclear program, but also may have opened a Pandora's box, paving the way for future nation-sponsored cyberattacks against critical infrastructure.

Snowden:

 Director Oliver Stone and actor Joseph Gordon-Levitt combine forces to portray the life of NSA whistleblower Edward Snowden – a traitor to some and a hero to others, after he leaked secret details of the U.S. government's electronic surveillance program.

Lo and Behold, Reveries of the Connected World:

 Legendary filmmaker Werner Herzog consults with luminaries, such as Tesla CEO Elon Musk and famed hacker Kevin Mitnick, to gain a sense of how the internet, IoT technologies, AI and other technological advances are reshaping society and humanity.

Risk:

 In the follow-up to her Snowden film Citizenfour, documentarian Laura Poitras gets inside access to WikiLeaks founder Julian Assange from 2010-2013, closely following the controversial activist as he publishes his latest troves of private government documents, and ultimately seeks refuge in the Ecuadorian embassy.

Jason Bourne:

 Matt Damon returns as former government assassin and amnesiac Jason Bourne, who discovers a CIA operation designed to leverage a popular social media platform as a mass surveillance tool. Although its portrayal of hacking has come under criticism for a lack of authenticity, the film nonetheless examines important cyber concepts such as privacy, metadata collection, data leaks and cyberespionage.

Source: SC Media

Topics: Edward Snowden, Elon Musk, Tesla, Werner Herzog, WikiLeaks, cybersecurity expert, electronic surveillance program, Julian Assange, keynote speaker, security awareness training, Jason Bourne, Lo and Behold, Matt Damon, Risk, zero-days, AI, IoT technologies, Kevin Mitnick, Laura Poitras, Oliver Stone

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

What's Included in a Penetration Test Report?

Penetration tests are an extremely useful exercise to mitigate risks and patch your security gaps. If you’ve been asking yourself why do penetration t..

Read more ›

What Is Pivoting in Cyber Security and What Does It Mean for Pentesters?

Data breaches in 2022 were abundant and sophisticated. Realistically, it’s expected that this year we will continue to see threat actors test their li..

Read more ›

What Is One-time Password (OTP) Social Engineering?

Even if your business has a mature cybersecurity program, there may be one vulnerability that threat actors can still use to steal your company data: ..

Read more ›
tech-texture-bg