profile card
Rohan Pinto
#Father, #Identity_Aficionado, #InfoSec_Professional
Ξ #CTO #Founder @1Kosmos
Mississauga, Ontario, CANADA

A self-professed “cryptography geek,” Rohan has been the go-to security and identity management maven for three decades. He has founded several businesses that take advantage of advancements in blockchain and identity management — and are responsible for many in their own right — and continue to show the world the incredible potential of well-implemented cryptographic systems.

DeFi for newbies: 1) Wallet setupDeFi for newbies: 1) Wallet setupEthereum Meta-Transactions 101Ethereum Meta-Transactions 101Creating and exploring a private Ethereum blockchain using GethCreating and exploring a private Ethereum blockchain using GethGeth is an Ethereum node for Blockchain written in the programming language Go. It can be used for mining or creating software which runs…Continue reading on Coinmonks »VG Basic Tutorial for Beginners — Creating a Kulupu Wallet [Updated]VG Basic Tutorial for Beginners — Creating a Kulupu Wallet [Updated]Integrating physical devices with IOTA — Amazon AlexaIntegrating physical devices with IOTA — Amazon AlexaIntegrating physical devices with IOTA — Peer-to-peer energy trading with IOTA Part 2Integrating physical devices with IOTA — Peer-to-peer energy trading with IOTA Part 2Integrating physical devices with IOTA — Peer-to-peer energy trading with IOTA Part 1Integrating physical devices with IOTA — Peer-to-peer energy trading with IOTA Part 1Integrating physical devices with IOTA — The Reverse Vending MachineIntegrating physical devices with IOTA — The Reverse Vending MachineClass Features Provided by SolidityClass Features Provided by SolidityThis article discusses Class Features provided by Solidity, the defacto smart contract language for the Ethereum blockchain.Continue reading on Coinmonks »

Hyperledger Fabric v2.X Monitoring Using PrometheusHyperledger Fabric v2.X Monitoring Using Prometheus1. OverviewContinue reading on Coinmonks »Getting started with - Hyperledger BesuGetting started with - Hyperledger BesuI have been working with various blockchain framework and experimenting with them. I have worked with both public and private permissioned…Continue reading on Coinmonks »Hyperledger Besu — Getting Started: Part 2Hyperledger Besu — Getting Started: Part 2This is Part 2 of the Hyperledger Besu implementation. In Part 1 we discussed the various features, consensus mechanism available.Continue reading on Coinmonks »How To Take a Backup For Your Hyperledger Fabric NetworkHow To Take a Backup For Your Hyperledger Fabric NetworkAnsible The Best Tool For Blockchain Developers To DeployAnsible The Best Tool For Blockchain Developers To DeployHyperledger Besu Node — New Client for EthereumHyperledger Besu Node — New Client for EthereumIntegrating Hyperledger Explorer with Hyperledger Fabric Network v2.2Integrating Hyperledger Explorer with Hyperledger Fabric Network v2.21. OverviewContinue reading on Coinmonks »Hyperledger Indy Custom Network with Indy Node & Plenum(Protocol & Ledger)Hyperledger Indy Custom Network with Indy Node & Plenum(Protocol & Ledger)

DeFIRE: Mirror Protocol, Anchor Protocol And Terra. Top 3 Platform For Passive Income.DeFIRE: Mirror Protocol, Anchor Protocol And Terra. Top 3 Platform For Passive Income.Here We Will Look At Passive Income Strategies, Lending, Staking, Synthetic Stocks, And Whether DeFi Can Do What The Fire Movement Does. InContinue reading on Coinmonks »How to snipe BSC token launches like a degen apeHow to snipe BSC token launches like a degen apeNeither using PancakeSwap UI or BSCScan.comContinue reading on Coinmonks »DAOs Are Better Than CompaniesDAOs Are Better Than CompaniesIn Defence of Polkadot’s Governance MechanismIn Defence of Polkadot’s Governance Mechanism6 criticisms and their rebuttalsContinue reading on Coinmonks »Avalanche Can Be Next Ethereum?Avalanche Can Be Next Ethereum?Extremely Fast And Scalable, But Also Highly Customisable. General view of $AVAXContinue reading on Coinmonks »There’s Too Many Tokens to Keep Track OfThere’s Too Many Tokens to Keep Track Of4 Green Bitcoin Alternatives You Should Know4 Green Bitcoin Alternatives You Should KnowIn comparison: Polkadot, Cardano, Peercoin and ICP. You should know and consider buying them!Continue reading on Coinmonks »Developed or Developing? The Sweet Battle Between Ethereum and Cardano!Developed or Developing? The Sweet Battle Between Ethereum and Cardano!It’s one of the ultimate battles in the Crypto space. Which is better? Ethereum or Cardano? Which one is the better investment opportunity…Continue reading on Coinmonks »Rollup Rollup! Top Layer 2 Compared — Arbitrum vs Optimism vs PolygonRollup Rollup! Top Layer 2 Compared — Arbitrum vs Optimism vs PolygonIn this article, we will allow ourselves to be properly spun around by rollups focusing on the differences between the three big names…Continue reading on Coinmonks »

Wegmans Notifies Customers of Data LeakWegmans Notifies Customers of Data LeakU.S. regional supermarket chain Wegmans informed customers that some personally identifying information data became exposed due to a data leak.  BleepingComputer originally reported this story. In a press release, Wegmans stated: “We recently became aware that, due to a previously undiscovered configuration issue, two of our cloud databases, which are used for business purposes and […] The post Wegmans Notifies Customers of Data Leak appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Our Predictions for the Future of SOCs (Security Operations Centers)Our Predictions for the Future of SOCs (Security Operations Centers)What are Solutions Review’s predictions for the future of SOCs (Security Operations Centers)? What can enterprises expect when setting up and operating their SOCs, and what can do to perhaps influence that future?  On June 29, Cysiv will conduct its SOC-as-a-Service: The Future Of SOC, Today webinar. The webinar plans to cover vital topics including […] The post Our Predictions for the Future of SOCs (Security Operations Centers) appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Tessian Releases Back to Work Security Behaviors ReportTessian Releases Back to Work Security Behaviors ReportTessian today released the findings of its Back to Work Security Behaviors report. This report explores how security behaviors have shifted during the past year, including challenges in transitioning to a hybrid work model.  Tessian focuses on machine learning email filters, spear-phishing prevention, data loss, data exfiltration, and non-compliant activity. In other words, they specialize […] The post Tessian Releases Back to Work Security Behaviors Report appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. The Highest Rated Threat Hunting Books Available on AmazonThe Highest Rated Threat Hunting Books Available on AmazonSolutions Review finds the Highest-Rated Threat Hunting books available on Amazon right now. You need to add these to your collection today.  Solutions Review frequently shares our finds for essential cybersecurity titles and books every InfoSec professional and IT security team should have on the shelf. Here’s one of our lists. For this list, we […] The post The Highest Rated Threat Hunting Books Available on Amazon appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. EA Breach: What We Know About Latest Major Cyber-AttackEA Breach: What We Know About Latest Major Cyber-AttackEA (Electronic Arts), one of the world’s largest video game studios, disclosed suffering a data breach in which hackers stole source code used in the company’s games. Vice originally broke the story.  According to sources, the EA breach took place on June 6. The hackers responsible stole 780 gigabytes of data, including the Frostbite source […] The post EA Breach: What We Know About Latest Major Cyber-Attack appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. It Only Takes One Cybersecurity Mistake to Let Hackers InIt Only Takes One Cybersecurity Mistake to Let Hackers InIt only takes one cybersecurity mistake to let hackers into your IT environment with essentially free reign. We list some of the most common mistakes enterprises make and how you can solve them.  A fairly common trope in fiction is “Evil Only Needs to Win Once.” The idea is that, unlike in other stories, the […] The post It Only Takes One Cybersecurity Mistake to Let Hackers In appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. What is SOAR? Exploring the Evolving Cybersecurity SpaceWhat is SOAR? Exploring the Evolving Cybersecurity SpaceWhat is SOAR? Why should your business select a SOAR solution for its cybersecurity needs? How is it evolving to meet enterprise demands?  Cybersecurity faces a unique opponent, which is to say that it isn’t just innovating for the sake of innovation or economic efficiency. Instead, it must constantly adapt and adjust to the threat […] The post What is SOAR? Exploring the Evolving Cybersecurity Space appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Exabeam Raises $200 Million In Latest Funding RoundExabeam Raises $200 Million In Latest Funding RoundExabeam recently announced raising $200 million in its latest funding round, a Series F growth round at a valuation of $2.4 billion. Owl Rock, a division of Blue Owl Capital, led the round, supported by existing partners. Additionally, Exabeam welcomed Michael DeCesare as its new CEO and President.  Exabeam is a SIEM security solution provider. […] The post Exabeam Raises $200 Million In Latest Funding Round appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Mimecast Releases The State of Brand Protection Report 2021Mimecast Releases The State of Brand Protection Report 2021Mimecast today released The State of Brand Protection Report 2021. This report details brand impression attacks, taking advantage of a surge in brand impression emails taking place over the pandemic. As always, changes in digital behaviors and hygiene invites new cyber-attacks from ever-mutable hackers.  Mimecast specializes in cloud-based email management. It works to integrate brand […] The post Mimecast Releases The State of Brand Protection Report 2021 appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Will XDR Supplant SIEM? What Does the Future Hold?Will XDR Supplant SIEM? What Does the Future Hold?Will Extended Detection and Response (XDR) supplant SIEM solutions in enterprise cybersecurity? What does the future hold for threat hunting and detection-oriented security technologies?  XDR is carving out space in the cybersecurity marketplace both wholly new and yet recognizable from other categories. It offers capabilities reminiscent of SOAR, EDR, and even SIEM. Yet at the […] The post Will XDR Supplant SIEM? What Does the Future Hold? appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management.

Flex streamlines app access for 20k suppliers with IAM overhaulFlex streamlines app access for 20k suppliers with IAM overhaulContract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property. (Insider Story)