profile card
Rohan Pinto
#Father, #Identity_Aficionado, #InfoSec_Professional
Ξ #CTO #Founder @1Kosmos
Mississauga, Ontario, CANADA

A self-professed “cryptography geek,” Rohan has been the go-to security and identity management maven for three decades. He has founded several businesses that take advantage of advancements in blockchain and identity management — and are responsible for many in their own right — and continue to show the world the incredible potential of well-implemented cryptographic systems.

Ultimate Guide to Bitcoin Testnet Fullnode SetupUltimate Guide to Bitcoin Testnet Fullnode SetupReact Project Setup Using Hardhat & Truffle — part 1React Project Setup Using Hardhat & Truffle — part 1SmartBCH Metamask Tutorial — Connect to Network, Transfer BCH, Add Tokens and Trade on DEXsSmartBCH Metamask Tutorial — Connect to Network, Transfer BCH, Add Tokens and Trade on DEXsSmartBCH with EVM compatibility becomes a strong contender in the DeFi field.Continue reading on Coinmonks »Etherscan.io TutorialEtherscan.io TutorialEtherscan is the most popular blockchain explorer for Ethereum and a analytics tool for researchers and investors.Continue reading on Coinmonks »Building your first DApp on Tezos: Part 1 —  Writing Smart Contract on SmartPyBuilding your first DApp on Tezos: Part 1 —  Writing Smart Contract on SmartPyHow to Set Up Metamask and Add Networks (BSC, Matic, OKEx Chain, SmartBCH)How to Set Up Metamask and Add Networks (BSC, Matic, OKEx Chain, SmartBCH)A Metamask Tutorial, connect metamask with sidechainsContinue reading on Coinmonks »How to test a BEP20 token with Hardhat and not get SCAMmedHow to test a BEP20 token with Hardhat and not get SCAMmedDeFi for newbies: 1) Wallet setupDeFi for newbies: 1) Wallet setupEthereum Meta-Transactions 101Ethereum Meta-Transactions 101

Hyperledger Fabric: How is it Different from Other Blockchains?Hyperledger Fabric: How is it Different from Other Blockchains?Hyperledger Fabric performance benchmarking using Hyperledger CaliperHyperledger Fabric performance benchmarking using Hyperledger Caliper1. OverviewContinue reading on Coinmonks »Hyperledger Fabric v2.X Monitoring Using PrometheusHyperledger Fabric v2.X Monitoring Using Prometheus1. OverviewContinue reading on Coinmonks »Getting started with - Hyperledger BesuGetting started with - Hyperledger BesuI have been working with various blockchain framework and experimenting with them. I have worked with both public and private permissioned…Continue reading on Coinmonks »Hyperledger Besu — Getting Started: Part 2Hyperledger Besu — Getting Started: Part 2This is Part 2 of the Hyperledger Besu implementation. In Part 1 we discussed the various features, consensus mechanism available.Continue reading on Coinmonks »How To Take a Backup For Your Hyperledger Fabric NetworkHow To Take a Backup For Your Hyperledger Fabric NetworkAnsible The Best Tool For Blockchain Developers To DeployAnsible The Best Tool For Blockchain Developers To DeployHyperledger Besu Node — New Client for EthereumHyperledger Besu Node — New Client for Ethereum

Analysis of Top 100 Cryptocurrencies (21 Oct 2021)Analysis of Top 100 Cryptocurrencies (21 Oct 2021)Winners, Losers, Heatmaps, News, and more.Continue reading on Coinmonks »Blockchain Consensus Protocols & Game TheoryBlockchain Consensus Protocols & Game TheoryShiba Inu Expansion with ATMs and Robinhood in an heated up Crypto Market.Shiba Inu Expansion with ATMs and Robinhood in an heated up Crypto Market.CryptoCurrency | Bitcoin | Shiba Inu | CoinBase | Robinhood | Binance | ATMsContinue reading on Coinmonks »ELI5: uint256 in SolidityELI5: uint256 in SolidityAnalysis of Top 100 Cryptocurrencies (20 Oct 2021)Analysis of Top 100 Cryptocurrencies (20 Oct 2021)Winners, Losers, News, and more.Continue reading on Coinmonks »Why EIP-1559 is importantWhy EIP-1559 is importantAutomating Uniswap v3 limit orders using Chainlink KeepersAutomating Uniswap v3 limit orders using Chainlink KeepersIs a Bear Market Coming for Bitcoin? How Low Could Bitcoin Go?Is a Bear Market Coming for Bitcoin? How Low Could Bitcoin Go?Processing Uniswap v3 limit orders using Chainlink Keepers (part 2)Processing Uniswap v3 limit orders using Chainlink Keepers (part 2)This Ethereum price chart pattern indicates that ETH could hit $6.5K in the fourth quarter.This Ethereum price chart pattern indicates that ETH could hit $6.5K in the fourth quarter.

Get 65 Percent Off These Udacity Cybersecurity Nanodegree ProgramsGet 65 Percent Off These Udacity Cybersecurity Nanodegree ProgramsYou can get 65 percent off of these top Udacity cybersecurity nanodegree programs now through the end of 2021. Organizations around the world continue to ramp up their security readiness efforts as the topic of cybersecurity becomes a major focus. It seems that every day, we hear new stories of security breaches, cyber-attacks, and hackers […] The post Get 65 Percent Off These Udacity Cybersecurity Nanodegree Programs appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. ThycoticCentrify: 83 Percent of Ransomware Victims Pay Their AttackersThycoticCentrify: 83 Percent of Ransomware Victims Pay Their AttackersAccording to a report recently released by ThycoticCentrify, 83 percent of ransomware victims pay to have their data restored. This information comes from the 2021 State of Ransomware Survey & Report based on a survey of 300 IT business decision-makers on the subject of ransomware and how it affects their business. The report showed how […] The post ThycoticCentrify: 83 Percent of Ransomware Victims Pay Their Attackers appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. Untangle: Top SMB Security Hurdle Is Disobedient EmployeesUntangle: Top SMB Security Hurdle Is Disobedient EmployeesAccording to a new report released by Untangle, the biggest security hurdle for SMB organizations is employees who don’t follow security practices. This information comes from the 2021 SMB IT Security report based on a survey of 740 small-to-medium-sized businesses (SMBs) on their IT security goals and plans. The report found that as organizations adjust […] The post Untangle: Top SMB Security Hurdle Is Disobedient Employees appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. Solutions Review Set to Host Third Annual InfoSec Insight JamSolutions Review Set to Host Third Annual InfoSec Insight JamWhen Solutions Review was founded in 2012, it was with a simple goal: to report on the latest developments in enterprise technology and make it easier for people to evaluate business software. We then built a collection of vendor-agnostic buyer’s resources to cut through the clutter of content and strip away the marketing hyperbole.  Solutions […] The post Solutions Review Set to Host Third Annual InfoSec Insight Jam appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. 5 Questions to Ask SIEM Solution Providers5 Questions to Ask SIEM Solution ProvidersSolutions Review lists the five questions you need to ask SIEM solutions providers when you’re evaluating tools. Security information and event management (SIEM) products were once only considered a solution for large enterprises worried about fulfilling their compliance reporting. The technology category has since shifted, both in terms of enterprise perception and common capabilities to […] The post 5 Questions to Ask SIEM Solution Providers appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. 5 Questions to Ask Before Selecting an SIEM Vendor5 Questions to Ask Before Selecting an SIEM VendorSolutions Review lists the five questions you need to ask of your business when you’re evaluating an SIEM solution. Security information and event management (SIEM) products were once only considered a solution for large enterprises worried about fulfilling their compliance reporting. The technology category has since shifted, both in terms of enterprise perception and common […] The post 5 Questions to Ask Before Selecting an SIEM Vendor appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. Twitch Suffers Massive Data Leak; Entire Source Code Reportedly StolenTwitch Suffers Massive Data Leak; Entire Source Code Reportedly StolenAn anonymous hacker has reportedly stolen 125 GB worth of internal data from Twitch, including its entire source code. Learn more about it below. Online video streaming juggernaut Twitch suffered a massive data leak earlier this week after a hacker gained access to its systems. According to sources who spoke to Video Games Chronicle, a […] The post Twitch Suffers Massive Data Leak; Entire Source Code Reportedly Stolen appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. The Best SIEM Systems for Enterprise SecurityThe Best SIEM Systems for Enterprise SecuritySolutions Review’s listing of the Security Information and Event Management (SIEM) systems is an annual mashup of products that best represent current market conditions, according to the crowd. Our editors selected the best SIEM systems based on each solution’s Authority Score, a meta-analysis of real user sentiment through the web’s most trusted business software review […] The post The Best SIEM Systems for Enterprise Security appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. LogPoint to Integrate SOAR Capabilities Into Its SIEM PlatformLogPoint to Integrate SOAR Capabilities Into Its SIEM PlatformLogPoint is introducing native security orchestration, automation, and response (SOAR) features into its SIEM platform, according to a press release on the company’s website. These updates will come via LogPoint 7.0 following the vendor’s acquisition of SecBI earlier this month. LogPoint 7.0 is expected to launch in December 2021, with detection and response features coming […] The post LogPoint to Integrate SOAR Capabilities Into Its SIEM Platform appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. The Best SIEM Tools and Vendors for 2021 and BeyondThe Best SIEM Tools and Vendors for 2021 and BeyondSolutions Review’s listing of the Security Information and Event Management (SIEM) tools is an annual mashup of products that best represent current market conditions, according to the crowd. Our editors selected the best SIEM products based on each solution’s Authority Score, a meta-analysis of real user sentiment through the web’s most trusted business software review […] The post The Best SIEM Tools and Vendors for 2021 and Beyond appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.

Flex streamlines app access for 20k suppliers with IAM overhaulFlex streamlines app access for 20k suppliers with IAM overhaulContract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property. (Insider Story)