profile card
Rohan Pinto
#Father, #Identity_Aficionado, #InfoSec_Professional
Ξ #CTO #Founder @1Kosmos
Mississauga, Ontario, CANADA

A self-professed “cryptography geek,” Rohan has been the go-to security and identity management maven for three decades. He has founded several businesses that take advantage of advancements in blockchain and identity management — and are responsible for many in their own right — and continue to show the world the incredible potential of well-implemented cryptographic systems.

DeFi for newbies: 1) Wallet setupDeFi for newbies: 1) Wallet setupEthereum Meta-Transactions 101Ethereum Meta-Transactions 101Creating and exploring a private Ethereum blockchain using GethCreating and exploring a private Ethereum blockchain using GethGeth is an Ethereum node for Blockchain written in the programming language Go. It can be used for mining or creating software which runs…Continue reading on Coinmonks »VG Basic Tutorial for Beginners — Creating a Kulupu Wallet [Updated]VG Basic Tutorial for Beginners — Creating a Kulupu Wallet [Updated]Integrating physical devices with IOTA — Amazon AlexaIntegrating physical devices with IOTA — Amazon AlexaIntegrating physical devices with IOTA — Peer-to-peer energy trading with IOTA Part 2Integrating physical devices with IOTA — Peer-to-peer energy trading with IOTA Part 2Integrating physical devices with IOTA — Peer-to-peer energy trading with IOTA Part 1Integrating physical devices with IOTA — Peer-to-peer energy trading with IOTA Part 1Integrating physical devices with IOTA — The Reverse Vending MachineIntegrating physical devices with IOTA — The Reverse Vending MachineClass Features Provided by SolidityClass Features Provided by SolidityThis article discusses Class Features provided by Solidity, the defacto smart contract language for the Ethereum blockchain.Continue reading on Coinmonks »

Hyperledger Fabric v2.X Monitoring Using PrometheusHyperledger Fabric v2.X Monitoring Using Prometheus1. OverviewContinue reading on Coinmonks »Getting started with - Hyperledger BesuGetting started with - Hyperledger BesuI have been working with various blockchain framework and experimenting with them. I have worked with both public and private permissioned…Continue reading on Coinmonks »Hyperledger Besu — Getting Started: Part 2Hyperledger Besu — Getting Started: Part 2This is Part 2 of the Hyperledger Besu implementation. In Part 1 we discussed the various features, consensus mechanism available.Continue reading on Coinmonks »How To Take a Backup For Your Hyperledger Fabric NetworkHow To Take a Backup For Your Hyperledger Fabric NetworkAnsible The Best Tool For Blockchain Developers To DeployAnsible The Best Tool For Blockchain Developers To DeployHyperledger Besu Node — New Client for EthereumHyperledger Besu Node — New Client for EthereumIntegrating Hyperledger Explorer with Hyperledger Fabric Network v2.2Integrating Hyperledger Explorer with Hyperledger Fabric Network v2.21. OverviewContinue reading on Coinmonks »Hyperledger Indy Custom Network with Indy Node & Plenum(Protocol & Ledger)Hyperledger Indy Custom Network with Indy Node & Plenum(Protocol & Ledger)

Top Methods Of Passive Income  — STAKING and MININGTop Methods Of Passive Income  — STAKING and MININGContinue reading on Coinmonks »Blank: A Privacy-Focused Browser Extension WalletBlank: A Privacy-Focused Browser Extension WalletBitcoin Gold & Ethereum Classic Rise 40% and Why That’s a Top SignalBitcoin Gold & Ethereum Classic Rise 40% and Why That’s a Top SignalBitcoin Gold (BTG) and Ethereum Classic (ETC) are seeing parabolic price increases. The background is that we explain to you here and now…Continue reading on Coinmonks »Keccak FunctionKeccak FunctionMacro Chart Rundown for 5/5/2021Macro Chart Rundown for 5/5/2021Crypto Mining Rig BuildCrypto Mining Rig BuildWhat’s important and why when building your rigContinue reading on Coinmonks »Uniswap v3 is liveUniswap v3 is liveThe company followed up on its March announcements to release the 3rd version of DeFi’s Uniswap platform. The upgrade is designed to make…Continue reading on Coinmonks »Comparing Bitcoin’s Last Halving Cycle to TodayComparing Bitcoin’s Last Halving Cycle to TodayCurrently, we are in the midst of Bitcoin’s Third Halving Cycle which at this moment in time reached a top of $64899.00 as of April 14th…Continue reading on Coinmonks »Ethereum (ETH) vs. Cardano (ADA): Which Is Best?Ethereum (ETH) vs. Cardano (ADA): Which Is Best?One of the two major crypto project competitions. All things merged what you need to know.Continue reading on Coinmonks »

Get 30-Day Free Access to Cybersecurity Courses on Udacity Right NowGet 30-Day Free Access to Cybersecurity Courses on Udacity Right NowGet 30-day free access to cybersecurity courses on Udacity right now with the online platform’s exclusive offer, available through May 23.  The growing importance of cybersecurity best practices and techniques for protecting against hackers is becoming paramount in the enterprise. The cybersecurity landscape is evolving in real-time, which has organizations scrambling to fortify their IT architectures soundly. […] The post Get 30-Day Free Access to Cybersecurity Courses on Udacity Right Now appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Why It’s Time to Ditch Legacy SIEM and Upgrade to Next-GenWhy It’s Time to Ditch Legacy SIEM and Upgrade to Next-GenWhy should your enterprise leave behind its legacy SIEM and upgrade to a next-generation solution? We consult SIEM provider Cysiv and its latest whitepaper “6 Common Frustrations With Legacy SIEMs And How SOC-as-a-Service Solves Them” to find out.  Sticking with a legacy SIEM solution, or any legacy cybersecurity solution, invites attackers into your IT environment […] The post Why It’s Time to Ditch Legacy SIEM and Upgrade to Next-Gen appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. SecureLink and Ponemon: Crisis in Third-Party Remote Access SecuritySecureLink and Ponemon: Crisis in Third-Party Remote Access SecuritySecureLink and the Ponemon Institute recently released its “A Crisis in Third-Party Remote Access Security” report. This report details the discrepancy between organizations’ perceived third-party access threat and their deployed security measures.  SecureLink specializes in third-party security, providing secure third-party remote access for both enterprises and technology vendors. It works to discover, solve, and secure […] The post SecureLink and Ponemon: Crisis in Third-Party Remote Access Security appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. The 8 Best Security Training LinkedIn Learning CoursesThe 8 Best Security Training LinkedIn Learning CoursesThe editors at Solutions Review have compiled this list of the 8 Best Security Training LinkedIn Learning Courses to consider if you’re looking to grow your skills. Originally Lynda.com, LinkedIn Learning is LinkedIn’s own video course website. Each course in its catalog is taught by industry experts in software, creative, and business skills. For our […] The post The 8 Best Security Training LinkedIn Learning Courses appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. When is the Right Time for a Managed Security Service?When is the Right Time for a Managed Security Service?When is the right time for a managed security service (MSS)? At what point should businesses partner with or hire a managed solution to their cybersecurity woes?  Enterprises face an uphill battle when dealing with cybersecurity challenges. Hackers constantly evolve their malware and cyber-threat tactics, making it difficult to keep up with the threat landscape. […] The post When is the Right Time for a Managed Security Service? appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. How Can SIEM Deflect and Deter Modern Cyber-Threats?How Can SIEM Deflect and Deter Modern Cyber-Threats?A new wave of cyber-threats is on its wave. How can SIEM deflect and deter modern cyber-threats?  Without cybersecurity, your business is out to sea. You need next-generation SIEM. It really is that simple. Some IT decision-makers chaff at the idea of SIEM can help them deflect modern cyber-threats; SIEM does possess a reputation as […] The post How Can SIEM Deflect and Deter Modern Cyber-Threats? appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Deep Instinct Raises $100 Million in Series D Funding RoundDeep Instinct Raises $100 Million in Series D Funding RoundDeep Instinct today announced raising $100 million in a Series D funding round. BlackRock led the funding round, with further participation from Untitled Investments, The Tudor Group, Anne Wojcicki, and existing investors. This brings total investment in the cybersecurity vendor to $200 million to date.  Deep Instinct positions itself as a deep learning cybersecurity company, […] The post Deep Instinct Raises $100 Million in Series D Funding Round appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Mimecast State of Email Security 2021 Shows Surge During PandemicMimecast State of Email Security 2021 Shows Surge During PandemicMimecast recently released its State of Email Security 2021 report. This report, the fifth iteration of its kind, uses interviews with 1,225 information technology and cybersecurity professionals from 12 industries across 10 countries to glean critical security insights. With their results, Mimecast detects an upsurge in email-based cyber-attacks since the beginning of the COVID-19 pandemic.  […] The post Mimecast State of Email Security 2021 Shows Surge During Pandemic appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Expert Commentary on the Geico Data Breach DisclosureExpert Commentary on the Geico Data Breach DisclosureInsurance company Geico recently filed a data breach notice with the attorney general of California. According to the disclosure, the breach occurred between January 21, 2021 and March 1, 2021 and exposed customers’ driver license numbers.  However, Geico did not disclose how many customers might have been affected nor whether the breach was limited to […] The post Expert Commentary on the Geico Data Breach Disclosure appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. How UEBA Helps Endpoint Security MonitoringHow UEBA Helps Endpoint Security MonitoringHow does user and entity behavioral analysis (UEBA) help with endpoint security monitoring? How does it represent a critical bridge between SIEM and endpoint protection platform?  UEBA is a critical component of modern SIEM solutions and enterprise-level cybersecurity. Samir Jain, Senior Product Manager of Security Analytics at SIEM vendor LogRhythm, shared a relevant definition of […] The post How UEBA Helps Endpoint Security Monitoring appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management.

Flex streamlines app access for 20k suppliers with IAM overhaulFlex streamlines app access for 20k suppliers with IAM overhaulContract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property. (Insider Story)