CSOs can monitor basically anything at any time. Here's how to do it wisely. Video cameras are smaller, cheaper and better; network monitoring tools can pluck packets out of the stream with great precision. Basically CSOs can watch anybody—or anything—any time. Those who do smart surveillance reap great benefits; those who duff it lose money, time and employee goodwill. Heres your guide to being smart.Watch What You’re DoingSurvey says: Too many CSOs still rely on outdated video surveillance practices.ROI InsideIntel’s five-year ROI study on video cameras suggests a useful model for deciding when, and how much, to invest.The Hidden Camera&…and other surveillance missteps can sour employees, threaten success or get you sued. Six dos and don’ts will keep you in focus. Keystroke CopsMonitoring network users can stop your company’s crown jewels from walking out the door.The Secaucus ModelNew Jersey Transit gets a lot more than security out of its surveillance. Related content news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Electronic Health Records Electronic Health Records news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing news New Trojan ZenRAT masquerades as Bitwarden password manager A report by Proofpoint identifies the new Trojan as undocumented and possessing information-stealing capabilities. By Lucian Constantin Sep 28, 2023 4 mins Cyberattacks Hacking Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe