2013 Industry Innovators

Access control

Access control is, arguably, the key aspect of information protection. We think of access control in several ways. For example, we consider access control as the way into a system. We may also apply it to applications.

Data protection

Data protection is, of course, a rather large group that covers a lot of territory and encompasses a variety of tools and services. The idea of data protection is at the core of information security.

Security infrastructure

The central theme here is GRC (governance, risk and compliance). GRC is at once the biggest pain point (arguably) of most large organizations and the most important task that does not usually get done right.


A look ahead

A group of prominent security professionals forecast the significant industry shifts in 2014. From threat vectors and government revelations, to lessons-learned and security solutions, they chime in on it all. Greg Masters compiles the responses.

Hall of Fame

2013 Industry Innovators HOF

The greatest pleasure that we have in writing this section each year is seeing who has the innovation and staying power to make it to the Hall of Fame. To make it, a company must have been selected for three years as an Innovator.


Five highly unofficial IT security predictions for 2014

Five highly unofficial IT security predictions for 2014

A growing threat: Privileged user abuse

A growing threat: Privileged user abuse

Thoughts on 2013 and beyond

Latest News

Hacker 'drags and drops' 43.4 million Weebly user accounts in mega breach

Website hosting service Weebly has confirmed a major data breach, following a report on LeakedSource.com that 43.4 million accounts were stolen from the company's main database in February 2016.

Zero days used in attacks on DNC, Podesta

Russian hackers are employing zero-day exploits to infect target networks, according to security researchers at ESET.

Researchers spot ransomware evolving into 'doxware' to scare victims into paying

Threat actors are upping the ante with "doxware" by implementing features to ransomware that could leak a victim's data if ransoms aren't paid.

Book of Lists

Top 8 threats in 2013

In what seemed to be the year of the financial hack, we've compiled a list of what we believe are the top eight threats of this year.

Top 3 law enforcement actions of 2013

While it may always seem like a cat and mouse game, the cat catches up every once in a while. Here are what we believe are the top 3 law enforcement actions of the year.

Top 5 legal developments in 2013

From the introduction of "Aaron's Law" to legislation being passed to curb the threat of cyber espionage, here are the notable legal developments of 2013.

Top Products

"Best Buy" products in 2013

A collection security products that the SC Labs team labeled as the "Best Buy" solutions in 2013.

"Recommended" products in 2013

Here's a list of all of the security products that our SC Labs team recommended this year.

Reboot Poll