CSO50 award-winning companies are rising to the cloud security challenge and finding new ways to protect data and assets. Credit: CSO / IDG Welcome to this special digital edition of CSO, featuring winners of our annual CSO50 awards. In these pages, you’ll learn how award-winning organizations are rising to the cloud security challenge and finding new ways to protect data and assets, the value of digital trust and how to earn it, the most pressing mobile security threats, and 6 key elements of any good disaster recovery plan.ContentsLEAD How (and why) to build digital trust Earning customers’ trust translates to better customer acquisition, greater customer loyalty and more revenue. Here’s how to do it.KNOW Mobile security threats you should take seriously in 2019 Mobile malware may grab the headlines, but every enterprise should have its eye on these more pressing mobile security threats.COVER STORY Seeding security in the cloud For many businesses, the fresh security risks posed by the rapid adoption of cloud technologies are driving deep security changes. For others, the cloud isn’t the reason for the security overhaul but the fundamental enabler of it. Three CSO50 award winners share their cloud success stories. RUN 6 things your disaster recovery plan should include Natural and man-made disasters can knock out enterprise networks and data access without warning. With a good disaster recovery plan, you’ll be better prepared for the unexpected. Related content news analysis P2Pinfect Redis worm targets IoT with version for MIPS devices New versions of the worm include some novel approaches to infecting routers and internet-of-things devices, according to a report by Cado Security. By Lucian Constantin Dec 04, 2023 5 mins Botnets Botnets Botnets news Hackers book profit by scamming Booking.com customers Malicious elements are using Vidar infostealer to gain access to Booking.com’s management portal and defraud customers. By Gagandeep Kaur Dec 04, 2023 4 mins Cyberattacks Cybercrime Security opinion Proactive, not reactive: the path to ensuring operational resilience in cybersecurity The experience of the financial sector in dealing with threats is instructive to anyone in the cybersecurity space — there’s no substitute for getting out ahead of potential risks and problems. By Cameron Dicker Dec 04, 2023 6 mins Financial Services Industry Financial Services Industry Financial Services Industry feature 4 budget-savvy strategies for building an effective purple team Building a purple team is not only for organizations with a generous budget. From the shoestring one-person operation harnessing open-source power to the well-oiled machine of a comprehensive team, organizations of all sizes have a pathway to heighte By Maril Vernon Dec 04, 2023 14 mins Threat and Vulnerability Management IT Training Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe