The Meraki MV series — Second Generation family (MV12, MV22, MV32 and MV72) with embedded people and car detection capabilities

./abstract

So you just got a new set of Meraki MV cameras. Surely you’ve dived into the dashboard and rejoiced on the many features they offer out-of-the-box. Now what? Now you get serious with them!

Remember the old days? When you monitored an environment and had no idea how your customers felt while waiting in line?

These days (can be) are long gone when you couple Smart sensors like Meraki’s MV cameras with AI face recognition services like AWS Rekognition. How about also looking for faces and inspecting them against a known database of former convicted people? …


Photo by CDC on Unsplash

Or “Why you still cannot respond quickly to new threats, despite your massive investments in Security”.

./TL;DR

If you lack integration between your security products, you need an “XDR” (Extended Detection and Response) solution. Many vendors now offer XDR on their portfolio. Make sure you choose one that supports 3rd party solutions.

./evolution

Blue team tools have gone a long way since traditional firewalls and antivirus. …


Take notes :)

“Nothing in the world is worth having or worth doing unless it means effort, pain, difficulty… I have never in my life envied a human being who led an easy life. I have envied a great many people who led difficult lives and led them well.” — Theodore Roosevelt

./intro

I won’t be the one telling you how different the year of 2020 has been. I will remind you, though, that in February Cisco implemented changes to their certification paths. Here’s a quick look at the main changes:

  • Introduced a new title: “Specialist” that sits between “Associate” (CCNA) and “Professional”…

Meraki Green?

./

Meraki has many different APIs. They cover all their Products: MX, MS, MR, MV, SM.

They can be divided according to their use cases, you’ll commonly see their API services being split into:

  • Dashboard API
  • Webhook API
  • Location Streaming API
  • Captive Portal API
  • MV Sense API

At the end of the day, though, all their API calls are all documented very well using the OpenAPI Specification. They’ve made a great job making it all available as a Postman Document, which I’ll leave a link to it in the references section, a very handy resource when developing an API.

P.S.: Postman…


./intro

By now, we should all be well aware of the fact that RESTful, API-driven platforms are the future.

And I’m not even talking about just for Networks and Security, it is an Industry trend that is not to be ignored.

I even wrote about the importance of coding for Net Engineers, years ago (published in early 2018): https://medium.com/@andrecamillo/the-case-for-network-engineers-and-the-web-f4e88edb9a4e

I believe, that you have grown used to seeing how every major Network, Information Security, Cloud vendor is releasing products that have open APIs that can be developed on — and hopefully the reason why you’re reading this is because you’re keen…


Photo by Glenn Carstens-Peters on Unsplash

If you are a Network engineer, you should have gotten used to hearing day after day about the importance of coding and developing code. Some colleagues haven’t bought this idea yet, but I think we should listen to this trend.

I work with Cisco products, have worked for the past 5 years. And what I have learned so far is that Cisco has made its products a lot more open lately. Think about it, aren’t Cisco’s IOS XE , NX-OS , FTD and many other of its newer Operating Systems becoming “programmable”?

As a consequence Cisco’s portfolio is becoming more…


Doors — or the many Entry points to your apps - Photo by Dil on Unsplash

Attack Surface will increase due to the huge transformation in how end users are deploying services. The industry is seeing huge transformation in how services are deployed. Not only can customers make use of multi-cloud to deploy their services, there are also new ways to do so, making it more difficult to secure and efficiently control their workloads. Applications have shifted from Dedicated (Bare metal) appliances to virtualized and now we’re seeing the rise of Containerized and Serverless workloads. Developers are now more empowered than ever: they can spin up new workloads in matters of minutes to test and eventually…


Photo by John Schnobrich on Unsplash

This tutorial is meant for AWS beginners. I’m going to go through the steps of how to:

  1. Launch an instance in AWS (and what the minimal settings we must look at to Secure it and get it connected.)
  2. Attach a Public IP to it (Elastic IP)
  3. Connect via SSH to it.

I’ll rely in official Amazon documentation, building on top of it, adding some important information that aren’t that easy to find when you’re getting started with AWS.

0. Prerequisites

You must have a valid AWS account. Set up yours here: https://aws.amazon.com/premiumsupport/knowledge-center/create-and-activate-aws-account/

1. Launch an Instance in AWS

We’ll be using an Official Ubuntu AMI (Amazon Machine Image)…


Photo of a 14th century Firewall — Photo by Johannes Krupinski on Unsplash

Kings sitting behind fortified Castle walls and moats are a thing of the past. though I’m sure some our current politicians would love to be siloed in such buildings.

But much like Monarchy eventually transitioned to a more people-centric government model (read Democracy) — something similar is happening to technology. Firewalls (our old, cosy and comfortable IT castles) are not enough to keep IT environments safe. Perimeter-based security was great when Data resided on On-Premises Data-centers.

However, ever since the Cloud revolution ignited the adoption of cloud-based services and hybrid cloud, the data migrated too — then initiating this new…

Andre Camillo

Network and Cloud Security engineer

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store