Our editorial team at SC Magazine is fortunate in that every year for our annual Reboot edition we get to touch base with and recognize passionate, thought-leading information security professionals who are making some astoundingly beneficial impacts to this industry. This year was no different. We congratulate every one SC Magazine's 2013 luminaries, professionals in the field who we call out for their achievements in 2013.

This Year's Luminaries

Features Researchers shed light on car hacking

Researchers shed light on car hacking

What self-described "stunt hackers" Charlie Miller and Chris Valasek did to a Ford Focus on national TV was akin to breaking into a home, raiding the fridge and taking a nap on the couch.

Features An academic creates a password-authentication model for the real world

An academic creates a password-authentication model for the real world

Chris Mitchell's creation, Uni-IDM (universal identity management), is a software-based tool that helps users manage the authentication process.

Features Researcher lobbies for increased security on medical devices

Researcher lobbies for increased security on medical devices

Jay Radcliffe showed how his insulin pump was vulnerable to a remote takeover.

Features From private sector to government

From private sector to government

Phyllis Schneck takes a level-headed approach to how the DHS should address potential attacks against critical infrastructure.

Features Civil liberties lawyer arguing against the NSA spying programs

Civil liberties lawyer arguing against the NSA spying programs

The revelations about government surveillance made public by Edward Snowden have brought urgency and clarity to the work Jennifer Stisa Granick is doing as director of civil liberties at the Stanford Center for Internet and Society (CIS).

Features Luminaries: Honorable mentions

Luminaries: Honorable mentions

We salute a number of professionals - including lawyers, analysts, journalists and engineers - whose achievements in 2013 greatly enhanced the IT security industry and those affected by it.

Book of Lists

Top 8 threats in 2013

In what seemed to be the year of the financial hack, we've compiled a list of what we believe are the top eight threats of this year.

Top 3 law enforcement actions of 2013

While it may always seem like a cat and mouse game, the cat catches up every once in a while. Here are what we believe are the top 3 law enforcement actions of the year.

Top 5 legal developments in 2013

From the introduction of "Aaron's Law" to legislation being passed to curb the threat of cyber espionage, here are the notable legal developments of 2013.

Top Products

"Best Buy" products in 2013

A collection security products that the SC Labs team labeled as the "Best Buy" solutions in 2013.

"Recommended" products in 2013

Here's a list of all of the security products that our SC Labs team recommended this year.

Reboot Poll