About Me

October 29, 20180 Commentsranjithmurali
[salt_banner bg_banner=”#d3d3d3″ link=”url:%23|title:Buy%20Now||” title=”About Me”]
[salt_title_block title_tag=”h3″ title=”Little About Me” description=”Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt.”][/salt_title_block]
[salt_title_block title_tag=”h5″ text_align=”left” description=”Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.”]Ranjith Murali is an Indian origin seasoned vet who is a Technologist, Security Analysis, Blogger, Keynote Speaker and Forensic Investigator. His technical background is a complex ecosystem consisting of knowledge in the following areas: social engineering, web/mobile/network hacking, infrastructure attacks, cryptography, and web pen-testing. Ranjith Murali has a diverse but complementary career evolution which makes him a versatile Security Specialist. Combining application testing, management skills and security testing, Ranjith Murali managed to achieve a level of combined expertise which is rarely found in the security market which makes him valuable asset to his clients.

He is a renowned name in the field of cyber security and forensic investigation, his expertise has been utilized by his high profile clients for deploying reliable technology for the edges of securing and safeguarding both personal and enterprises data’s. He drives several partnerships program with his highly decorated client’s and several governmental institution for tackling and mitigating cyber security problems through connectivity and appropriate technology.

His mission is to make things, fix problems and help others. Wherever technology can help to do these three things and accelerate progress, he enjoys figuring out that intersection and adding constructive value. He is a champion in cyber security and works to support entrepreneurs and enterprise to scale their work and impact.[/salt_title_block]

[salt_title_block title_tag=”h3″ title=”LITTLE MORE” description=”Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt.”][/salt_title_block]
[salt_title_block title_tag=”h5″ text_align=”left” title=”TECH – TALKS”]The strong background![/salt_title_block][salt_step_list 0=””][salt_step_list_item title=”2014″ description=”Middle East Energy Security Forum ” icon_style=”icon-darker” icon=”ion-ios-paper-outline”][salt_step_list_item title=”2015″ description=”Digital Forensics Cyber Crime Investigation Summit ” icon_style=”icon-darker” icon=”ion-ios-book-outline”][salt_step_list_item title=”2016″ description=”CYBERSENSE ” icon_style=”icon-darker” icon=”ion-ios-pricetags-outline”][salt_step_list_item title=”2016″ description=”(ISC)2 SECURE DUBAI ” icon_style=”icon-darker” icon=”ion-ios-pricetags-outline”][/salt_step_list]
[salt_title_block title_tag=”h5″ text_align=”left” title=”TECH – GROOVES”]The consistent growth![/salt_title_block][salt_charts label_marker=”2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018″ line_grid=”true” bezier_curve=”true” chart_line_item=”%5B%7B%22point%22%3A%220%2C%2015%2C%2019%2C%2025%2C%2033%2C%2042%2C%2049%2C%2060%2C%2069%2C%2076%22%2C%22fillColor%22%3A%22rgba(151%2C187%2C205%2C0.2)%22%2C%22strokeColor%22%3A%22%2397bbcd%22%2C%22pointColor%22%3A%22%2397bbcd%22%7D%5D”]
[salt_title_block title=”TECH – STAT” description=”Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt.”][/salt_title_block]
[salt_count_up_number icons=”ion-happy-outline” position_icon=”right” count_numb=”293″ description=”Penetration Test “]
[salt_count_up_number icons=”ion-ios-flag-outline” position_icon=”right” count_numb=”302″ description=”Vulnerability Assessments
“]
[salt_count_up_number icons=”ion-ios-flame-outline” position_icon=”right” count_numb=”12″ description=”Forensic Investigation
“]
[salt_count_up_number icons=”ion-ios-albums-outline” position_icon=”right” count_numb=”136″ description=”High Profile Security “]
[salt_title_block title=”Awards & Recognition”][/salt_title_block]
[salt_icon_text align=”center” style=”feature-box” title=”Elite Member National Cyber Security” icon=”fa fa-user-md” css=”.vc_custom_1540969781939{background-color: #ffffff !important;}”]To promote e-Governance for empowering citizens, promoting the inclusive and sustainable growth of the Electronics, IT &ITeS industries, enhancing India’s role in Internet Governance, adopting a multipronged approach that includes development of human resources, promoting R&D and innovation, enhancing efficiency through digital services and ensuring a secure cyber space.[/salt_icon_text][salt_icon_text align=”center” style=”feature-box” title=”Unsurpassed Research Paper –on– Digital Forensics” css=”.vc_custom_1540970096343{background-color: #ffffff !important;}” icon=”fa fa-star-o”]Constant rise in the number of crimes committed over the internet, increasing complexity in the type of attacks – incidents where corporate data is extracted and sent to the attacker. This paper focuses on the importance of Digital Forensics in today’s Digitized world and getting a closer look at the new & improved tools needed for a Digital Investigation[/salt_icon_text]
[salt_icon_text align=”center” style=”feature-box” title=”Best Research Paper –on– Cyberwars Cybernetic Battlefield” icon=”fa fa-eye” css=”.vc_custom_1540970087765{background-color: #ffffff !important;}”]The 10th MEESEC is a highly focused platform for the Security Community to listen, discuss, network and identify the potential, current and future security threats faced by Critical infrastructure owners and governments together with their possible solutions.[/salt_icon_text][salt_icon_text align=”center” style=”feature-box” title=”Preeminent Research Paper –on– Securing Industrial Control Systems” css=”.vc_custom_1540970103201{background-color: #ffffff !important;}” icon=”fa fa-briefcase”]The research paper has address topics covering ICSs, including protection for SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other field in control system devices[/salt_icon_text]
[salt_call_to_action style_cta=”style-5″ title_cta=”Lets Go !!!” link_cta=”url:http%3A%2F%2Fwww.ranjithmurali.com%2Fmedia-hub%2F|title:Click%20Here|target:%20_blank|” css=”.vc_custom_1554561902677{padding-top: 0px !important;}”]Get a gimps of all the media presence of past and present[/salt_call_to_action]