Share on social networks!

5 movies about Cybersecurity

Cybersecurity is a term that we use with increasing frequency in our daily lives. Cybersecurity is no longer something from science fiction, but is present in the real world. However, the world of cybersecurity has always played a role in cinema. If we stop to think for a moment we can make a long list of films based on Cybersecurity.

Which are the most interesting? I present to you my 5 favorites.

Tron (1982)

All of us who are dedicated to the world of computing have a special affection for this eighties movie where a programmer is divided into molecules and transported to the bowels of a computer in which an evil program (malware) controls behaviors at will.

You can see it on: Amazon Prime Video

The Matrix (1999)

It is the hacker film par excellence that brought the world of computing and cybersecurity closer to society. Perhaps the term cybersecurity was not mentioned as such, but the Wachowski sisters did talk to us about system errors, show us computer viruses that self-replicate, etc.

Thomas Anderson is a brilliant programmer for a reputable software company. But outside of work he is Neo, a hacker that one day he receives a mysterious visit...

You can see it on: Netflix, Amazon Prime Video

Catch Me If You Can (2002)

Based on a true story, this film is, for me, the best example of social engineering that cinema has shown us.

In the sixties, Frank W. Abagnale was a young and elusive criminal who adopted various identities: doctor, lawyer or airline co-pilot. Carl Hanratty, an FBI agent, was tasked with tracking him down and capturing him to bring him to justice, but Frank was always one step ahead of him.

You can see it on: Netflix, Amazon Prime Video

Deciphering Enigma (2014)

If there is a period where the cryptography It took on vital importance in the Second World War, in which encryption and codebreaking became another front of struggle.

Deciphering Enigma is a biopic about the British mathematician Alan Turing, famous for having deciphered the secret Nazi codes contained in the Enigma machine, which determined the outcome of World War II (1939-1945) in favor of the Allies. Far from being admired as a hero, Turing was accused and tried for his homosexuality in 1952.

You can see it on: Netflix

Snowden (2016)

You undoubtedly heard this story in the media of the moment since it is one of the most popular and recent real events in history. cyber intelligence world.

During the course of the film, there is talk of monitoring, hacking and eavesdropping programs, where personal data is stored and exploited to be used for cyber intelligence or national cybersecurity purposes, or at least that is the pretext of the US Government.

It narrates the events that followed the publication by the newspaper 'The Guardian' of the classified documents provided by the young National Security Agency (NSA) analyst Edward Snowden about the Agency's secret global surveillance program in 2013. some documents that revealed that they were spying on billions of people around the planet...

You can see it on: Amazon Prime Video

Without a doubt, not all of them are there. I encourage you to complete the list and comment on which ones are your favorites.

Author: María José Peña. Computer engineer. IT Project Director. Cinephile and passionate about Cybersecurity

Subscribe to our newsletter to stay up to date with all the news

EIP International Business School informs you that the data in this form will be processed by Mainjobs Internacional Educativa y Tecnológica, SA as the person responsible for this website. The purpose of collecting and processing personal data is to respond to the query made as well as to send information about the services of the data controller. Legitimation is the consent of the interested party.
You can exercise your rights of access, rectification, limitation and deletion of data in compliance@grupomainjobs.com as well as the right to file a claim with the supervisory authority. You can consult additional and detailed information on Data Protection in the Privacy Policy that you will find in our Web page
Master Cybersecurity Professional Master

Leave a comment