profile card
Rohan Pinto
#Father, #Identity_Aficionado, #InfoSec_Professional
Ξ #CTO #Founder @1Kosmos
Mississauga, Ontario, CANADA

A self-professed “cryptography geek,” Rohan has been the go-to security and identity management maven for three decades. He has founded several businesses that take advantage of advancements in blockchain and identity management — and are responsible for many in their own right — and continue to show the world the incredible potential of well-implemented cryptographic systems.

Short guide for your first dappShort guide for your first dappUltimate Guide to Bitcoin Testnet Fullnode SetupUltimate Guide to Bitcoin Testnet Fullnode SetupReact Project Setup Using Hardhat & Truffle — part 1React Project Setup Using Hardhat & Truffle — part 1SmartBCH Metamask Tutorial — Connect to Network, Transfer BCH, Add Tokens and Trade on DEXsSmartBCH Metamask Tutorial — Connect to Network, Transfer BCH, Add Tokens and Trade on DEXsSmartBCH with EVM compatibility becomes a strong contender in the DeFi field.Continue reading on Coinmonks »Etherscan.io TutorialEtherscan.io TutorialEtherscan is the most popular blockchain explorer for Ethereum and a analytics tool for researchers and investors.Continue reading on Coinmonks »Building your first DApp on Tezos: Part 1 —  Writing Smart Contract on SmartPyBuilding your first DApp on Tezos: Part 1 —  Writing Smart Contract on SmartPyHow to Set Up Metamask and Add Networks (BSC, Matic, OKEx Chain, SmartBCH)How to Set Up Metamask and Add Networks (BSC, Matic, OKEx Chain, SmartBCH)A Metamask Tutorial, connect metamask with sidechainsContinue reading on Coinmonks »How to test a BEP20 token with Hardhat and not get SCAMmedHow to test a BEP20 token with Hardhat and not get SCAMmedDeFi for newbies: 1) Wallet setupDeFi for newbies: 1) Wallet setup

Hyperledger Fabric: How is it Different from Other Blockchains?Hyperledger Fabric: How is it Different from Other Blockchains?Hyperledger Fabric performance benchmarking using Hyperledger CaliperHyperledger Fabric performance benchmarking using Hyperledger Caliper1. OverviewContinue reading on Coinmonks »Hyperledger Fabric v2.X Monitoring Using PrometheusHyperledger Fabric v2.X Monitoring Using Prometheus1. OverviewContinue reading on Coinmonks »Getting started with - Hyperledger BesuGetting started with - Hyperledger BesuI have been working with various blockchain framework and experimenting with them. I have worked with both public and private permissioned…Continue reading on Coinmonks »Hyperledger Besu — Getting Started: Part 2Hyperledger Besu — Getting Started: Part 2This is Part 2 of the Hyperledger Besu implementation. In Part 1 we discussed the various features, consensus mechanism available.Continue reading on Coinmonks »How To Take a Backup For Your Hyperledger Fabric NetworkHow To Take a Backup For Your Hyperledger Fabric NetworkAnsible The Best Tool For Blockchain Developers To DeployAnsible The Best Tool For Blockchain Developers To DeployHyperledger Besu Node — New Client for EthereumHyperledger Besu Node — New Client for Ethereum

How to: Earn Staking Rewards on Ethereum NOW Without Locking it UpHow to: Earn Staking Rewards on Ethereum NOW Without Locking it UpAre Ethereum Whales Signaling Big Turnaround for Shiba Inu?Are Ethereum Whales Signaling Big Turnaround for Shiba Inu?The 2021 crypto darling finished the year on a down note but may be primed for another turn upwardsContinue reading on Coinmonks »Building, Deploy and Interact with a Simple Web3 Smart Contract using a Web2 design thinking.Building, Deploy and Interact with a Simple Web3 Smart Contract using a Web2 design thinking.IntroductionContinue reading on Coinmonks »Crypto 101: Liquidity Pools and Impermanent LossCrypto 101: Liquidity Pools and Impermanent LossSetup Geth Ethereum Private Blockchain and connect to RemixSetup Geth Ethereum Private Blockchain and connect to RemixDeFi 2.0: Introduction & DeFi 1.0 IssuesDeFi 2.0: Introduction & DeFi 1.0 IssuesDeFi 2.0 is an evolving trend in the Blockchain world that aims to solve the problems of early versions to create long-term sustainable…Continue reading on Coinmonks »Why Rio de Janeiro wants to convert 1% of its reserves into cryptocurrencies ?Why Rio de Janeiro wants to convert 1% of its reserves into cryptocurrencies ?The mayor of Rio de Janeiro, Eduardo Paes, is considering investing 1% of the public treasury budget in cryptocurrencies. The city could…Continue reading on Coinmonks »Cryptos Are Set to Move Significantly Higher In 2022Cryptos Are Set to Move Significantly Higher In 2022These 7 Cryptos Could Double in 2022 Based On Their Unique TraitsContinue reading on Coinmonks »15 Promising cryptocurrencies to have in your wallet in 202215 Promising cryptocurrencies to have in your wallet in 2022Promising cryptocurrenciesContinue reading on Coinmonks »Is Ethereum in line for another hit to the downside?Is Ethereum in line for another hit to the downside?

How to Protect Your Company from the Five Consequences of Data LossHow to Protect Your Company from the Five Consequences of Data LossAs part of Solutions Review’s Premium Content Series—a collection of contributed columns written by industry experts in maturing software categories—Rob Price, the Principal Solutions Consultant at Snow Software, shares some expert insights on how to protect your company against the consequences involved in data loss. Data loss is one of the worst things that can […] The post How to Protect Your Company from the Five Consequences of Data Loss appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. Choose Your Security Solutions Based on Threats, Not AcronymsChoose Your Security Solutions Based on Threats, Not AcronymsThis is part of Solutions Review’s Premium Content Series, a collection of contributed columns written by industry experts in maturing software categories. In this submission, Vice President at Beachhead Solutions Cam Roberson offers insights into selecting the best security solution for your company. IT leaders tasked with vetting, buying, and deploying data and system security solutions […] The post Choose Your Security Solutions Based on Threats, Not Acronyms appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. Understanding and Complying with the New MFA Requirements for Cyber InsuranceUnderstanding and Complying with the New MFA Requirements for Cyber InsuranceThis is part of Solutions Review’s Premium Content Series, a collection of contributed columns written by industry experts in maturing software categories. In this submission, Yaron Kassner, the CTO and co-founder of Silverfort, shares some expert insights into the new MFA requirements that companies need to know about. A few months ago, the insurance industry […] The post Understanding and Complying with the New MFA Requirements for Cyber Insurance appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. 5G Adoption, Ransomware, and Cyber Disruption within a Software-Defined World5G Adoption, Ransomware, and Cyber Disruption within a Software-Defined WorldThis is part of Solutions Review’s Premium Content Series, a collection of contributed columns written by industry experts in maturing software categories. In this submission, Theresa Lanowitz, Head of Cybersecurity Evangelism at AT&T Business, offers some insights and commentary on 5G adoption, cyber disruption, and ransomware. The FBI’s Internet Crime Complaint Center reported 2,084 ransomware complaints from […] The post 5G Adoption, Ransomware, and Cyber Disruption within a Software-Defined World appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. The Best SIEM Tools and Vendors to Know About in 2022The Best SIEM Tools and Vendors to Know About in 2022Solutions Review’s listing of the Security Information and Event Management (SIEM) tools is an annual mashup of products that best represent current market conditions. Our editors selected the best SIEM tools and vendors based on each one’s Authority Score, a meta-analysis of user sentiment collected via business software review sites, and our proprietary five-point inclusion […] The post The Best SIEM Tools and Vendors to Know About in 2022 appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. SMBs are Unprepared to Deal with Worsening Cyberthreats LandscapeSMBs are Unprepared to Deal with Worsening Cyberthreats LandscapeThis article was written by Maxime Trotter, VP of Sales & Marketing for Devolutions as part of the Information Security Insight Jam 2021. While the pandemic forced many SMBs to scale back their operations, hackers shifted into a higher gear. Cyber-attacks against SMBs — and especially on their remote workers — increased throughout 2020 and […] The post SMBs are Unprepared to Deal with Worsening Cyberthreats Landscape appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. 32 Experts Share Predictions for Information Security in 202232 Experts Share Predictions for Information Security in 2022As part of our Information Security Insight Jam, we got in touch with several experts and asked for their advice and predictions for information security in 2022. These experts represent the top cybersecurity vendors, security hardware and software providers, and IT software companies, and have decades of combined experience with securing and protecting user and […] The post 32 Experts Share Predictions for Information Security in 2022 appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. 5 SIEM Vendors to Watch in 20225 SIEM Vendors to Watch in 2022Solutions Review’s SIEM Vendors to Watch is an annual listing of solution providers we believe are worth monitoring. Companies are commonly included if they demonstrate a product roadmap aligning with our meta-analysis of the marketplace. Other criteria include recent and significant funding, talent acquisition, a disruptive or innovative new technology or product, or inclusion in […] The post 5 SIEM Vendors to Watch in 2022 appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. 32 Experts Share Advice on Information Security in 202232 Experts Share Advice on Information Security in 2022As part of our Information Security Insight Jam, we got in touch with several experts and asked for their advice and predictions for information security in 2022. These experts represent the top cybersecurity vendors, security hardware and software providers, and IT software companies, and have decades of combined experience with securing and protecting user and […] The post 32 Experts Share Advice on Information Security in 2022 appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. Solutions Review’s Third Annual Information Security Insight Jam: Event Live BlogSolutions Review’s Third Annual Information Security Insight Jam: Event Live BlogSolutions Review presents its third annual Information Security Insight Jam community web event! Our editors will live blog all the news, tips, and insights in this space. The Information Security Insight Jam is a cybersecurity community web event. Solutions Review editors are bringing the best and brightest minds in the industry together for a one-day social […] The post Solutions Review’s Third Annual Information Security Insight Jam: Event Live Blog appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.