profile card
Rohan Pinto
#Father, #Identity_Aficionado, #InfoSec_Professional
Ξ #CTO #Founder @1Kosmos
Mississauga, Ontario, CANADA

A self-professed “cryptography geek,” Rohan has been the go-to security and identity management maven for three decades. He has founded several businesses that take advantage of advancements in blockchain and identity management — and are responsible for many in their own right — and continue to show the world the incredible potential of well-implemented cryptographic systems.

Testnet: The Complete GuideTestnet: The Complete GuideGitHub repositories to learn Web3 developmentGitHub repositories to learn Web3 developmentGuide to Cosmos EcosystemGuide to Cosmos EcosystemHow to wrap fungible tokens into NFT (aka minting Gift Cards) using Solidity?How to wrap fungible tokens into NFT (aka minting Gift Cards) using Solidity?Another Airdrop! How to get the Valas Airdrop using Geist.Finance!Another Airdrop! How to get the Valas Airdrop using Geist.Finance!Diving deeper into Cellframe: Python SDK & Plugins pt. 1Diving deeper into Cellframe: Python SDK & Plugins pt. 1How to Choose the Right Crypto Tax Software, Part 1: Review Exchange CoverageHow to Choose the Right Crypto Tax Software, Part 1: Review Exchange CoverageUnderstanding Solidity by exampleUnderstanding Solidity by exampleThe Blockchain Beginners Guide — Meta MaskThe Blockchain Beginners Guide — Meta MaskShort guide for your first dappShort guide for your first dapp

Benchmark blockchain using Hyperledger CaliperBenchmark blockchain using Hyperledger CaliperHyperledger Fabric: How is it Different from Other Blockchains?Hyperledger Fabric: How is it Different from Other Blockchains?Hyperledger Fabric performance benchmarking using Hyperledger CaliperHyperledger Fabric performance benchmarking using Hyperledger CaliperHyperledger Fabric v2.X Monitoring Using PrometheusHyperledger Fabric v2.X Monitoring Using PrometheusGetting started with - Hyperledger BesuGetting started with - Hyperledger BesuHyperledger Besu — Getting Started: Part 2Hyperledger Besu — Getting Started: Part 2How To Take a Backup For Your Hyperledger Fabric NetworkHow To Take a Backup For Your Hyperledger Fabric NetworkAnsible The Best Tool For Blockchain Developers To DeployAnsible The Best Tool For Blockchain Developers To Deploy

Bitcoin, Ethereum Analysis: As Sentiment Analysis Tends Towards Extreme FearBitcoin, Ethereum Analysis: As Sentiment Analysis Tends Towards Extreme FearIf You Trade Crypto, Get a Damn Hobby!If You Trade Crypto, Get a Damn Hobby!Weekly Analyze of Crypto Investing in MayWeekly Analyze of Crypto Investing in MayGain Money With Crypto: 6 Ways To Earn Bitcoin and Other Crypto With Binance Earn.Gain Money With Crypto: 6 Ways To Earn Bitcoin and Other Crypto With Binance Earn.After 8 years, Ethereum is upgrading to Proof-of-Stake.After 8 years, Ethereum is upgrading to Proof-of-Stake.Blockchain Development: A Promising FutureBlockchain Development: A Promising FutureAre Ethereum (ETH) and Bitcoin (BTC) a Good Investment these Days?Are Ethereum (ETH) and Bitcoin (BTC) a Good Investment these Days?Ethereum (ETH)Continue reading on Coinmonks »A Truly Beginner’s Guide — Ethereum (Part 3)A Truly Beginner’s Guide — Ethereum (Part 3)Can Ethereum hit 100k?Can Ethereum hit 100k?Why You should own at least 1 Cryptocurrency?Why You should own at least 1 Cryptocurrency?

The Best Cybersecurity Certification Courses on Udemy to ConsiderThe Best Cybersecurity Certification Courses on Udemy to ConsiderThe editors at Solutions Review have compiled this list to spotlight some of the best cybersecurity certification courses on Udemy to consider if you’re looking to grow your skills. As more businesses transition to remote and hybrid workplaces, the importance of a well-trained, knowledgeable cybersecurity team has only grown. However, the cybersecurity field is constantly […] The post The Best Cybersecurity Certification Courses on Udemy to Consider appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. The 8 Key Features to Look For in a SIEM SolutionThe 8 Key Features to Look For in a SIEM SolutionThe editors at Solutions Review have outlined some of the most valuable features of Security Information and Event Management (SIEM) software to help companies find the best SIEM solution for their needs. Security Information and Event Management (SIEM) products were once considered a solution for large enterprises worried about fulfilling their compliance reporting requirements. However, […] The post The 8 Key Features to Look For in a SIEM Solution appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. How to Ensure Security and Compliance in the CloudHow to Ensure Security and Compliance in the CloudAs part of Solutions Review’s Premium Content Series—a collection of contributed columns written by industry experts in maturing software categories—Venkat Thiruvengadam, the Founder and CEO of DuploCloud, shares some insights on ensuring security and compliance in cloud-based environments. Compliance can be complex, especially with the growing number of security standards (SOC 2, ISO 27001, PCI, […] The post How to Ensure Security and Compliance in the Cloud appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. DevSecOps for SAP: The Missing LinkDevSecOps for SAP: The Missing LinkAs part of Solutions Review’s Premium Content Series—a collection of contributed columns written by industry experts in maturing software categories—Christoph Nagy, the CEO and a founding member of SecurityBridge, shares insights on DevSecOps for SAP. With DevSecOps, companies can leverage agile development concepts and inject them with automation tools to increase how new services are […] The post DevSecOps for SAP: The Missing Link appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. How to Meet the Challenges of Securing Modern IoT Devices and NetworksHow to Meet the Challenges of Securing Modern IoT Devices and NetworksAs part of Solutions Review’s Premium Content Series—a collection of contributed columns written by industry experts in maturing software categories—Dogu Narin, Head of Products at Versa Networks, shares some expert insights on securing your IoT devices and networks from cyber threats. To say that Internet of Things (IoT) growth is strong would be the understatement of the […] The post How to Meet the Challenges of Securing Modern IoT Devices and Networks appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. The Case for Implementing Post-Quantum Cryptography TodayThe Case for Implementing Post-Quantum Cryptography TodayAs part of Solutions Review’s Premium Content Series—a collection of contributed columns written by industry experts in maturing software categories—Rebecca Krauthamer, the Co-Founder and Chief Product Officer at QuSecure, shares some expert insights on the value of implementing post-quantum cryptography. Public-key cryptography has become an indispensable component of our global communication digital infrastructure in the […] The post The Case for Implementing Post-Quantum Cryptography Today appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. The Path Forward for Zero Trust FrameworksThe Path Forward for Zero Trust FrameworksAs part of Solutions Review’s Premium Content Series—a collection of contributed columns written by industry experts in maturing software categories—Bren Briggs, the VP of DevSecOps at Hypergiant, shares insights on what Zero Trust frameworks should look like moving forward. The federal government must adopt the Zero Trust information security framework. This is both a new […] The post The Path Forward for Zero Trust Frameworks appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. Democratizing Cybersecurity: Why Converged SOAR and SIEM Can Up-Level Security PosturesDemocratizing Cybersecurity: Why Converged SOAR and SIEM Can Up-Level Security PosturesAs part of Solutions Review’s Premium Content Series—a collection of contributed columns written by industry experts in maturing software categories—Charles Kenney, the Regional Director of Logpoint, shares some expert insights on using SOAR and SIEM solutions to democratize your cybersecurity strategies. What do American football and cybersecurity have in common? In both disciplines, it’s a […] The post Democratizing Cybersecurity: Why Converged SOAR and SIEM Can Up-Level Security Postures appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. How to Enhance Threat Hunting in the Modern EnterpriseHow to Enhance Threat Hunting in the Modern EnterpriseAs part of Solutions Review’s Premium Content Series—a collection of contributed columns written by industry experts in maturing software categories—Dave Armlin, the Field CTO for ChaosSearch, shares expert insights on enhancing your threat hunting efforts. Cyber-attacks are becoming more widespread, sophisticated, and costly every year. According to a Deep Instinct report, ransomware grew by 435% between […] The post How to Enhance Threat Hunting in the Modern Enterprise appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. The Highest Rated Threat Hunting Books Available on AmazonThe Highest Rated Threat Hunting Books Available on AmazonSolutions Review finds the Highest-Rated Threat Hunting books available on Amazon right now. You need to add these to your collection today.  Solutions Review frequently shares our finds for essential cybersecurity titles and books every InfoSec professional and IT security team should have on the shelf. Here’s one of our lists. For this list, we […] The post The Highest Rated Threat Hunting Books Available on Amazon appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.