profile card
Rohan Pinto
#Father, #Identity_Aficionado, #InfoSec_Professional
Ξ #CTO #Founder @1Kosmos
Mississauga, Ontario, CANADA

A self-professed “cryptography geek,” Rohan has been the go-to security and identity management maven for three decades. He has founded several businesses that take advantage of advancements in blockchain and identity management — and are responsible for many in their own right — and continue to show the world the incredible potential of well-implemented cryptographic systems.

DeFi for newbies: 1) Wallet setupDeFi for newbies: 1) Wallet setupEthereum Meta-Transactions 101Ethereum Meta-Transactions 101Creating and exploring a private Ethereum blockchain using GethCreating and exploring a private Ethereum blockchain using GethGeth is an Ethereum node for Blockchain written in the programming language Go. It can be used for mining or creating software which runs…Continue reading on Coinmonks »VG Basic Tutorial for Beginners — Creating a Kulupu Wallet [Updated]VG Basic Tutorial for Beginners — Creating a Kulupu Wallet [Updated]Integrating physical devices with IOTA — Amazon AlexaIntegrating physical devices with IOTA — Amazon AlexaIntegrating physical devices with IOTA — Peer-to-peer energy trading with IOTA Part 2Integrating physical devices with IOTA — Peer-to-peer energy trading with IOTA Part 2Integrating physical devices with IOTA — Peer-to-peer energy trading with IOTA Part 1Integrating physical devices with IOTA — Peer-to-peer energy trading with IOTA Part 1Integrating physical devices with IOTA — The Reverse Vending MachineIntegrating physical devices with IOTA — The Reverse Vending MachineClass Features Provided by SolidityClass Features Provided by SolidityThis article discusses Class Features provided by Solidity, the defacto smart contract language for the Ethereum blockchain.Continue reading on Coinmonks »

Blockchain Private chainsBlockchain Private chainsWith Ethereum come a certain number of properties. For instance, anyone with a computer and the freely available software can participate…Continue reading on Coinmonks »What is BlockchainWhat is BlockchainSatoshi Nakamoto (whose identity remains shrouded in mystery) published his seminal white paper in October, 2008. His paper presented…Continue reading on Coinmonks »Hyperledger Fabric v2.X Monitoring Using PrometheusHyperledger Fabric v2.X Monitoring Using Prometheus1. OverviewContinue reading on Coinmonks »Getting started with - Hyperledger BesuGetting started with - Hyperledger BesuI have been working with various blockchain framework and experimenting with them. I have worked with both public and private permissioned…Continue reading on Coinmonks »Hyperledger Besu — Getting Started: Part 2Hyperledger Besu — Getting Started: Part 2This is Part 2 of the Hyperledger Besu implementation. In Part 1 we discussed the various features, consensus mechanism available.Continue reading on Coinmonks »How To Take a Backup For Your Hyperledger Fabric NetworkHow To Take a Backup For Your Hyperledger Fabric NetworkAnsible The Best Tool For Blockchain Developers To DeployAnsible The Best Tool For Blockchain Developers To DeployHyperledger Besu Node — New Client for EthereumHyperledger Besu Node — New Client for EthereumIntegrating Hyperledger Explorer with Hyperledger Fabric Network v2.2Integrating Hyperledger Explorer with Hyperledger Fabric Network v2.21. OverviewContinue reading on Coinmonks »Hyperledger Indy Custom Network with Indy Node & Plenum(Protocol & Ledger)Hyperledger Indy Custom Network with Indy Node & Plenum(Protocol & Ledger)

POW NFT Community Grant ProgramPOW NFT Community Grant ProgramEthereum Will be Bigger than BitcoinEthereum Will be Bigger than BitcoinUnderstanding one of the defining platforms of our lifetimes.Continue reading on Coinmonks »Polygon (MATIC): Could It Win The ETH Scaling Race?Polygon (MATIC): Could It Win The ETH Scaling Race?MATIC, after rebranding, signed too many unique projects and races with ETH about scaling.Continue reading on Coinmonks »Ethereum Berlin Consensus FailureEthereum Berlin Consensus FailureStaking , everything you need to know Part 2: Ethereum stakingStaking , everything you need to know Part 2: Ethereum stakingBlockchain development Quick Starter Guide for Software DevelopersBlockchain development Quick Starter Guide for Software DevelopersMany companies started to develop application which can run on the blockchain. This article should be enough to get you started if you…Continue reading on Coinmonks »How To Earn Passive Income With Cryptocurrency MiningHow To Earn Passive Income With Cryptocurrency MiningWhen and why cryptocurrency mining makes financial senseContinue reading on Coinmonks »How Blockchain is going to disrupt the Neobroker marketHow Blockchain is going to disrupt the Neobroker marketComparing Modern Smart Contracting EnvironmentsComparing Modern Smart Contracting Environments

Mimecast State of Email Security 2021 Shows Surge During PandemicMimecast State of Email Security 2021 Shows Surge During PandemicMimecast recently released its State of Email Security 2021 report. This report, the fifth iteration of its kind, uses interviews with 1,225 information technology and cybersecurity professionals from 12 industries across 10 countries to glean critical security insights. With their results, Mimecast detects an upsurge in email-based cyber-attacks since the beginning of the COVID-19 pandemic.  […] The post Mimecast State of Email Security 2021 Shows Surge During Pandemic appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Expert Commentary on the Geico Data Breach DisclosureExpert Commentary on the Geico Data Breach DisclosureInsurance company Geico recently filed a data breach notice with the attorney general of California. According to the disclosure, the breach occurred between January 21, 2021 and March 1, 2021 and exposed customers’ driver license numbers.  However, Geico did not disclose how many customers might have been affected nor whether the breach was limited to […] The post Expert Commentary on the Geico Data Breach Disclosure appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. How UEBA Helps Endpoint Security MonitoringHow UEBA Helps Endpoint Security MonitoringHow does user and entity behavioral analysis (UEBA) help with endpoint security monitoring? How does it represent a critical bridge between SIEM and endpoint protection platform?  UEBA is a critical component of modern SIEM solutions and enterprise-level cybersecurity. Samir Jain, Senior Product Manager of Security Analytics at SIEM vendor LogRhythm, shared a relevant definition of […] The post How UEBA Helps Endpoint Security Monitoring appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Why You Need a Clear Phishing Prevention Plan for Your BusinessWhy You Need a Clear Phishing Prevention Plan for Your BusinessWhy does your business need a clear phishing prevention plan? What steps of incident response can you take care of ahead of time? Can it actually help mitigate an attack? When we discuss cybersecurity, perhaps because of its already storied history, we tend to think of viruses battering on the gates until something breaks through. […] The post Why You Need a Clear Phishing Prevention Plan for Your Business appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. 4 Key Cybersecurity Courses Available on Udacity Today4 Key Cybersecurity Courses Available on Udacity TodaySolutions Review lists four key cybersecurity courses available on Udacity IT security professionals can take right now. Are you a cybersecurity professional looking to gain new knowledge or brush up on your skills? Looking to expand your knowledge or skills into other InfoSec roles in your security operations center? Online learning programs offered through websites […] The post 4 Key Cybersecurity Courses Available on Udacity Today appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. 4 Key Cybersecurity Certification Courses on Whizlabs4 Key Cybersecurity Certification Courses on WhizlabsSolutions Review lists four key cybersecurity certification courses available on Whizlabs IT security professionals can take right now. Are you a cybersecurity professional looking to gain new knowledge or brush up on your skills? Do you want to earn a cybersecurity certification but don’t know how to prepare yourself for the exams? Online learning programs […] The post 4 Key Cybersecurity Certification Courses on Whizlabs appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Bitglass Releases Latest Remote Workforce Security ReportBitglass Releases Latest Remote Workforce Security ReportBitglass recently released the latest iteration of its “Remote Workforce Security Report.” This study explores the latest remote work trends and security strategies IT organizations continue to employ in the wake of the COVID-19 pandemic. Additionally, the research indicates how enterprises are preparing their workplaces for when vaccinations make remote work more optional.  Bitglass offers […] The post Bitglass Releases Latest Remote Workforce Security Report appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Where in Your Environment Should You Deploy SIEM First?Where in Your Environment Should You Deploy SIEM First?Where in your environment should you deploy SIEM first? The benefits of SIEM can’t be overstated; it remains a critical tool for gaining cybersecurity insights and maintaining network visibility. To simplify its working, SIEM’s log management aggregates security event information from across the network. Then, it normalizes this data, ensuring it’s all working in the […] The post Where in Your Environment Should You Deploy SIEM First? appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. The Risks Of Attack Lateral Movement Within Your Organization by Liron Barak of BitDamThe Risks Of Attack Lateral Movement Within Your Organization by Liron Barak of BitDamWhat are the risks of lateral movement in your business? What is lateral movement in the first place? How can your enterprise defend against it?  This guest post by Liron Barak, Co-Founder and CEO of BitDam, answers these questions in-depth and gets your IT security on the right foot.  The Risks Of Attack: Lateral Movement […] The post The Risks Of Attack Lateral Movement Within Your Organization by Liron Barak of BitDam appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Cybersecurity Expert Lessons We Learned From the Q1 Data BreachesCybersecurity Expert Lessons We Learned From the Q1 Data BreachesWhat expert lessons did we learn from the Q1 data breaches?  We’re rapidly approaching the end of Q1 2021, and unfortunately, it has been a busy cybersecurity season. Businesses across the U.S. experienced a staggering amount of data breaches of all sizes and scopes; in fact, we could only cover a portion of all the […] The post Cybersecurity Expert Lessons We Learned From the Q1 Data Breaches appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management.

Flex streamlines app access for 20k suppliers with IAM overhaulFlex streamlines app access for 20k suppliers with IAM overhaulContract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property. (Insider Story)