Cyber Security Articles & News

Legendary filmmaker Werner Herzog takes on the internet

Master filmmaker Werner Herzog (Grizzly Man, Cave of Forgotten Dreams) examines the past, present and constantly evolving future of the Internet in Lo and Behold: Reveries of the Connected World. Working with NETSCOUT, a world leader in-real time service assurance and cybersecurity, which came aboard as a producer and led him into a new world, Herzog conducted original interviews with cyberspace pioneers and prophets such as PayPal and Tesla co-founder Elon Musk, Internet protocol inventor Bob Kahn, and famed hacker Kevin Mitnick.

These provocative conversations reveal the ways in which the online world has transformed how virtually everything in the real world works, from business to education, space travel to healthcare, and the very heart of how we conduct our personal relationships. The film finds Herzog bringing his distinctive documentarian gifts to bear on a timely topic with typically thought-provoking result. As Herzog himself says regarding his film’s topic: “It is one of the biggest revolutions we as humans are experiencing.” (Werner Herzog, 2016, 98 min, DCP)

“[Herzog’s] commentary is the center, however provisional, of a world that has become a directionless network. His voice is the sound, still present, of human contact.” The Nation

“The shape of things to come is a subject very dear to the hearts of the high-tech evangelists Herzog talks to, and it accounts for the pulse of freakish comedy that beats through ‘Lo and Behold.’ New Yorker

“It’s fascinating, scary (so scary), interesting stuff.” Detroit News

Source: Arttheater

Topics: Social Engineering, Elon Musk, Grizzly Man, penetration testing, Tesla, Werner Herzog, World's Most Famous Hacker, internet, keynote speaker, PayPal, security awareness training, security consultant, Lo and Behold, malware, simulated phishing, Spam, Cave of Forgotten Dreams, cybercrime, cybersecurity vulnerabilities, Kevin Mitnick, NETSCOUT

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Top Techniques Used by Social Engineers

Social engineers use new techniques daily to gain unauthorized access to private systems and servers. But while new tactics are ever-arising, many “tr..

Read more ›

Lessons Learned From GoDaddy's 2021 Data Breach

The American internet domain registrar and web hosting company GoDaddy recently made the news for the latest 2021 security breach. 

Read more ›

How Social Engineering Can Affect an Organization

Organizations around the world are enrolled in security awareness training programs and taught to look out for cybercriminals who are using a hacking ..

Read more ›