The Meraki MV series — Second Generation family (MV12, MV22, MV32 and MV72) with embedded people and car detection capabilities


So you just got a new set of Meraki MV cameras. Surely you’ve dived into the dashboard and rejoiced on the many features they offer out-of-the-box. Now what? Now you get serious with them!

Remember the old days? When you monitored an environment and had no idea how your customers felt while waiting in line?

These days (can be) are long gone when you couple Smart sensors like Meraki’s MV cameras with AI face recognition services like AWS Rekognition. How about also looking for faces and inspecting them against a known database of former convicted people? …

Inside Out — and the other way around too.

Here’s the challenge:

You created a file on your development device and now you need to run it from a Host in AWS/Azure — How do you Upload it securely?

What if you need to download a file you modified in this Cloud hosted device into your local device for backup — How do you download this File securely?

Answer: Secure FTP, or SFTP for short.

What you’ll need:

  • Authentication Key to log in to the remote host.
  • Have SFTP installed on your device. It’s intalled by default in most modern OSs.

Scenario 1: Upload files to remote host:

  1. Open…

For many years, IT industry vendors’ have relied and pitched the idea of being experts and specialists in some products and segments. This approach is known as “Best-of-Breed”. The landscape has been changing to a different approach lately, though. Vendors are now calling their portfolio “Best-of-Platform”, let’s have a look at why.

Like most changes in Enterprise IT, this one came from Consumer offers. You’ve known and experienced this in very deep ways in your personal life — and it’s time Enterprises start thinking about this too.

Enterprises walking into the unknown

In this article I’ll explore how Cloud providers and Cybersecurity vendors are setting…

Photo by CDC on Unsplash

Or “Why you still cannot respond quickly to new threats, despite your massive investments in Security”.


If you lack integration between your security products, you need an “XDR” (Extended Detection and Response) solution. Many vendors now offer XDR on their portfolio. Make sure you choose one that supports 3rd party solutions.


Blue team tools have gone a long way since traditional firewalls and antivirus. …

Take notes :)

“Nothing in the world is worth having or worth doing unless it means effort, pain, difficulty… I have never in my life envied a human being who led an easy life. I have envied a great many people who led difficult lives and led them well.” — Theodore Roosevelt


I won’t be the one telling you how different the year of 2020 has been. I will remind you, though, that in February Cisco implemented changes to their certification paths. Here’s a quick look at the main changes:

  • Introduced a new title: “Specialist” that sits between “Associate” (CCNA) and “Professional”…

Meraki Green?


Meraki has many different APIs. They cover all their Products: MX, MS, MR, MV, SM.

They can be divided according to their use cases, you’ll commonly see their API services being split into:

  • Dashboard API
  • Webhook API
  • Location Streaming API
  • Captive Portal API
  • MV Sense API

At the end of the day, though, all their API calls are all documented very well using the OpenAPI Specification. They’ve made a great job making it all available as a Postman Document, which I’ll leave a link to it in the references section, a very handy resource when developing an API.

P.S.: Postman…


By now, we should all be well aware of the fact that RESTful, API-driven platforms are the future.

And I’m not even talking about just for Networks and Security, it is an Industry trend that is not to be ignored.

I even wrote about the importance of coding for Net Engineers, years ago (published in early 2018):

I believe, that you have grown used to seeing how every major Network, Information Security, Cloud vendor is releasing products that have open APIs that can be developed on — and hopefully the reason why you’re reading this is because you’re keen…

Photo by Glenn Carstens-Peters on Unsplash

If you are a Network engineer, you should have gotten used to hearing day after day about the importance of coding and developing code. Some colleagues haven’t bought this idea yet, but I think we should listen to this trend.

I work with Cisco products, have worked for the past 5 years. And what I have learned so far is that Cisco has made its products a lot more open lately. Think about it, aren’t Cisco’s IOS XE , NX-OS , FTD and many other of its newer Operating Systems becoming “programmable”?

As a consequence Cisco’s portfolio is becoming more…

Doors — or the many Entry points to your apps - Photo by Dil on Unsplash

Attack Surface will increase due to the huge transformation in how end users are deploying services. The industry is seeing huge transformation in how services are deployed. Not only can customers make use of multi-cloud to deploy their services, there are also new ways to do so, making it more difficult to secure and efficiently control their workloads. Applications have shifted from Dedicated (Bare metal) appliances to virtualized and now we’re seeing the rise of Containerized and Serverless workloads. Developers are now more empowered than ever: they can spin up new workloads in matters of minutes to test and eventually…

Andre Camillo

Cloud Security engineer — Andre has been an IT professional for a decade with a range of experience from Support, to Sales, to Consulting.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store