profile card
Rohan Pinto
#Father, #Identity_Aficionado, #InfoSec_Professional
Ξ #CTO #Founder @1Kosmos
Mississauga, Ontario, CANADA

A self-professed “cryptography geek,” Rohan has been the go-to security and identity management maven for three decades. He has founded several businesses that take advantage of advancements in blockchain and identity management — and are responsible for many in their own right — and continue to show the world the incredible potential of well-implemented cryptographic systems.

Ultimate Guide to Bitcoin Testnet Fullnode SetupUltimate Guide to Bitcoin Testnet Fullnode SetupReact Project Setup Using Hardhat & Truffle — part 1React Project Setup Using Hardhat & Truffle — part 1SmartBCH Metamask Tutorial — Connect to Network, Transfer BCH, Add Tokens and Trade on DEXsSmartBCH Metamask Tutorial — Connect to Network, Transfer BCH, Add Tokens and Trade on DEXsSmartBCH with EVM compatibility becomes a strong contender in the DeFi field.Continue reading on Coinmonks »Etherscan.io TutorialEtherscan.io TutorialEtherscan is the most popular blockchain explorer for Ethereum and a analytics tool for researchers and investors.Continue reading on Coinmonks »Building your first DApp on Tezos: Part 1 —  Writing Smart Contract on SmartPyBuilding your first DApp on Tezos: Part 1 —  Writing Smart Contract on SmartPyHow to Set Up Metamask and Add Networks (BSC, Matic, OKEx Chain, SmartBCH)How to Set Up Metamask and Add Networks (BSC, Matic, OKEx Chain, SmartBCH)A Metamask Tutorial, connect metamask with sidechainsContinue reading on Coinmonks »How to test a BEP20 token with Hardhat and not get SCAMmedHow to test a BEP20 token with Hardhat and not get SCAMmedDeFi for newbies: 1) Wallet setupDeFi for newbies: 1) Wallet setupEthereum Meta-Transactions 101Ethereum Meta-Transactions 101

Hyperledger Fabric: How is it Different from Other Blockchains?Hyperledger Fabric: How is it Different from Other Blockchains?Hyperledger Fabric performance benchmarking using Hyperledger CaliperHyperledger Fabric performance benchmarking using Hyperledger Caliper1. OverviewContinue reading on Coinmonks »Hyperledger Fabric v2.X Monitoring Using PrometheusHyperledger Fabric v2.X Monitoring Using Prometheus1. OverviewContinue reading on Coinmonks »Getting started with - Hyperledger BesuGetting started with - Hyperledger BesuI have been working with various blockchain framework and experimenting with them. I have worked with both public and private permissioned…Continue reading on Coinmonks »Hyperledger Besu — Getting Started: Part 2Hyperledger Besu — Getting Started: Part 2This is Part 2 of the Hyperledger Besu implementation. In Part 1 we discussed the various features, consensus mechanism available.Continue reading on Coinmonks »How To Take a Backup For Your Hyperledger Fabric NetworkHow To Take a Backup For Your Hyperledger Fabric NetworkAnsible The Best Tool For Blockchain Developers To DeployAnsible The Best Tool For Blockchain Developers To DeployHyperledger Besu Node — New Client for EthereumHyperledger Besu Node — New Client for Ethereum

All You Need to Know About ERC-20 TokensAll You Need to Know About ERC-20 TokensERC interface, implementation considerations, famous ERC-20 tokens, and more.Continue reading on Coinmonks »Blockchain: Unhashing the Hash Functions— Part 1Blockchain: Unhashing the Hash Functions— Part 1NFTs Are Adaptive EntitiesNFTs Are Adaptive EntitiesNovember OverviewNovember OverviewCreate your own cryptocurrency on Ethereum BlockchainCreate your own cryptocurrency on Ethereum BlockchainThe concept of Ethreum and the ethereum token can be very confusing. Ethereum has its own currency called ether and also has tokens that…Continue reading on Coinmonks »NFT as a collateral on crypto loansNFT as a collateral on crypto loansNFTs are a hot topic in the last months and as time goes by they are developing very interesting use cases also in the financial and money…Continue reading on Coinmonks »ARBITRUM: L2, AVM and ROLLUPSARBITRUM: L2, AVM and ROLLUPSLet’s find out what Arbitrum, Ethereum’s Layer 2 that uses rollups to improve scalability, is all about. Here’s how it worksContinue reading on Coinmonks »Connecting to MetaMask +React.js + Custom Hook + State ManagementConnecting to MetaMask +React.js + Custom Hook + State Management100X Metaverse Altcoin For Q4100X Metaverse Altcoin For Q4Metaverse coins keep exploding. Time to involve now.Continue reading on Coinmonks »Flashloan Bot on PolygonFlashloan Bot on PolygonLet’s build a simple flashloan bot on polygon with 1inch API and DODO!Continue reading on Coinmonks »

Solutions Review’s Third Annual Information Security Insight Jam: Event Live BlogSolutions Review’s Third Annual Information Security Insight Jam: Event Live BlogSolutions Review presents its third annual Information Security Insight Jam community web event! Our editors will live blog all the news, tips, and insights in this space. The Information Security Insight Jam is a cybersecurity community web event. Solutions Review editors are bringing the best and brightest minds in the industry together for a one-day social […] The post Solutions Review’s Third Annual Information Security Insight Jam: Event Live Blog appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. Cymulate: Ransomware Victims Are Increasing Security After an AttackCymulate: Ransomware Victims Are Increasing Security After an AttackAccording to a report recently released by Cymulate, ransomware victims increase their security protocols and measures after suffering an attack. This information comes from the 2021 Ransomware Study: Unexpected Reasons for Optimism report based on a survey of nearly 900 enterprise professionals around the globe. The report shows that while ransomware attacks across the globe […] The post Cymulate: Ransomware Victims Are Increasing Security After an Attack appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. What to Expect During the Third Annual Solutions Review InfoSec Insight Jam on December 6What to Expect During the Third Annual Solutions Review InfoSec Insight Jam on December 6What is the InfoSec Insight Jam? The InfoSec Insight Jam is a cybersecurity and information security community web event. Solutions Review editors are bringing the best and brightest minds in the industry together for a one-day social media gathering. Participants will include industry analysts, experts, influencers, practitioners, and software solution providers under the hashtag #InfoSecInsightJam. […] The post What to Expect During the Third Annual Solutions Review InfoSec Insight Jam on December 6 appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. 45 Percent of Companies Don’t Have a Chief Information Security Officer45 Percent of Companies Don’t Have a Chief Information Security OfficerAccording to a new report by Navisite, 45 percent of companies don’t employ a Chief Information Security Officer (CISO). This information comes from the State of Cybersecurity Leadership and Readiness report based on a survey of 130 security and IT professionals in the United States. The report revealed just how many companies still lack the […] The post 45 Percent of Companies Don’t Have a Chief Information Security Officer appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. AT&T Government Trusted Internet Helps U.S. Government Secure ITAT&T Government Trusted Internet Helps U.S. Government Secure ITAT&T Cybersecurity is launching AT&T Government Trusted Internet for helping U.S. federal agencies modernize IT, according to a press release on PR Newswire. The solution combines SD-WAN technology, security capabilities and fiber connectivity in a 24/7 managed solution. With this, AT&T Cybersecurity is better poised to assist U.S. government agencies in securing remote access to […] The post AT&T Government Trusted Internet Helps U.S. Government Secure IT appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. Essential Features to Look for When Evaluating SOAR SolutionsEssential Features to Look for When Evaluating SOAR SolutionsSolutions Review lists the 12 essential features to look for when evaluating SOAR solutions according to Swimlane. Security orchestration, automation, and response (SOAR) vendors like Swimlane offer tools that allow companies to set up workflows for automated security tasks. It lifts much of the burden off of security teams by automatically handling time-consuming manual tasks, […] The post Essential Features to Look for When Evaluating SOAR Solutions appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. Solving Cybersecurity Problems with Automated Incident ResponseSolving Cybersecurity Problems with Automated Incident ResponseSolutions Review explores critical problems affecting security teams and how automated incident response can solve them, according to Swimlane. It seems like every day, we hear a new news story about security and data breaches at major companies around the world. These high-profile cases are a reminder to the public of how critical it is […] The post Solving Cybersecurity Problems with Automated Incident Response appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. Robinhood Discloses Data Breach, Seven Million Customers AffectedRobinhood Discloses Data Breach, Seven Million Customers AffectedRobinhood disclosed a data breach and security incident that has affected seven million users. Learn all about it below. Financial services company Robinhood revealed that it had suffered a data breach on November 3rd. An external user obtained access to the organization’s customer support systems via social engineering by phone. This allowed the third-party individual(s) […] The post Robinhood Discloses Data Breach, Seven Million Customers Affected appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. The Best SIEM Courses on CourseraThe Best SIEM Courses on CourseraSolutions Review compiled the top SIEM courses on Coursera for cybersecurity and IT professionals of all skill levels. Your organization needs to ensure that only authorized users and employees can access your systems at all times. Without the proper tools and employee training in place, your company could be opening itself up to attacks from […] The post The Best SIEM Courses on Coursera appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. Entrust: Hybrid Work Is Causing Security and Productivity IssuesEntrust: Hybrid Work Is Causing Security and Productivity IssuesAccording to a recent report by Entrust, hybrid workforces are causing issues that affect both corporate security and employee productivity. This information comes from the Hybrid’s Impact on Workplace Security and Productivity report based on a survey of 1,500 company leaders and 1,500 employees. The report showed how the new landscape of hybrid and remote […] The post Entrust: Hybrid Work Is Causing Security and Productivity Issues appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.