The Meraki MV series — Second Generation family (MV12, MV22, MV32 and MV72) with embedded people and car detection capabilities

./abstract

So you just got a new set of Meraki MV cameras. Surely you’ve dived into the dashboard and rejoiced on the many features they offer out-of-the-box. Now what? Now you get serious with them!

Remember the old days? When you monitored an environment and had no idea how your customers…


Photo by EJ Strat on Unsplash

So in my last article we discussed about the DevOps culture, back then I briefly introduced the concept of Continuous Integration and Continuous Delivery or Deployment, or as most people refer to it, CI/CD.

./methodology

CICD is a software development methodology that prioritizes fast software development and updates through automation it…


Developers collaborating

As a Cloud Security professional, you will undoubtedly come across projects and discussions about protecting development environments. …


Converging into the one XDR

A good XDR platform will allow you the best monitoring capabilities alongside integration with the tools you use.

This is exactly the case of Trend Micro’s Vision One XDR, which — as a native XDR (What Is XDR? (trendmicro.com)) — has the ability to integrate with Trend Micro’s:

  • Endpoint Protection…

(Don’t) Click on that bait.

Netflix’s new thriller, Clickbait is more than your run-the-mill murder TV show. Let’s have a look at “Tech in Clickbait”.

DISCLAIMER: This is not a critic of how the show was delivered, I’ll leave that to the critics (Clickbait — Rotten Tomatoes). …


Or, how SANS mapped out a great number of Security frameworks in a way that actually makes sense.

Charting your way into a more secure environment

./abstract

Cybersecurity covers a broad an ever expanding set of subjects. Unsurprisingly, it is challenging to build an effective security practice from scratch without the proper foundations on the theme. …


With Red Canary’s Atomic Red team

Red Canary’s Logo — I love science and canaries, they got me hooked in their logo.

The best way to assess your defence is to run tests on it. CISOs have known this for decades at this point. But…

./securityTesting

Your environment is complex, you don’t have the time, your team is overloaded with alerts and other tasks, oh and you’re no pentester nor have you…


So you were ordered to come up with a solution that can read peoples’ emotions in a meeting and report in real time what the crowd is feeling?

Well, “you better not f*** it up”, after all it’s an important demonstration of how well we can integrate multiple vendors while…


Inside Out — and the other way around too.

Here’s the challenge:

You created a file on your development device and now you need to run it from a Host in AWS/Azure — How do you Upload it securely?

What if you need to download a file you modified in this Cloud hosted device into your local device for…


For many years, IT industry vendors’ have relied and pitched the idea of being experts and specialists in some products and segments. This approach is known as “Best-of-Breed”. The landscape has been changing to a different approach lately, though. …

Andre Camillo

Cloud Security engineer — Andre, BSc. Computer Engineering, has been an IT professional for a decade with a range of experience from Support to Consulting.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store