Peter Fellini

Peter Fellini

Peter Fellini is AVP of Cybersecurity with Compass Cyber Guard. Peter has over 20 years of experience in a variety IT Security fields such as Ethical Hacking, Social Engineering, and Auditing. He has a Masters of Science in Education as well as industry certifications including Certified Information Systems Security Professional (CISSP), Social Engineering Pentest Professional (SEPP), Offensive Security Wireless Professional (OSWP), PCI Professional (PCIP), etc. Peter has competed multiple times at DefCon's Social Engineering Village in the SECTF challenge. He is also attending school part-time at Johnson & Wales University to become a professional craft beer brewer.

Posts by Peter Fellini

Cyber Safe Scholars: Developing IT Security Awareness Among Students

Classroom

In the rapidly transforming internet era, the significance of cybersecurity emerges as a cornerstone for navigating the online world safely and responsibly, particularly for the younger generation, who are increasingly immersed in online environments. This necessity transcends the rea …

Read Story

Multi-Factor Authorization (MFA) During Cellular Network Outage

Cell Tower Outage

Multi-factor authentication (MFA) stands as a crucial safeguard in thwarting unauthorized access to accounts. Traditionally, one of the most widespread practices has been the use of a mobile device as a key component in this security measure. Users typically receive a one-time passwor …

Read Story

Can Neuralink Be Hacked? Cybersecurity Experts Weigh-In

Neuralink Hacked

Last month, Elon Musk, the renowned entrepreneur, revealed that his venture, Neuralink, has successfully implanted its brain-computer interface in a human subject for the first time. Musk shared on X (previously known as Twitter) that the individual is recovering well and early outcom …

Read Story

What is Flipper Zero? Portable Hacking “Multi-Tool” Explained

Flipper Zero

Wireless communication is integral to the modern world. Whether it is phones, Wi-Fi connectivity, or bank cards, these devices employ different types / wavelengths of wireless signals for their operations. Though infiltrating these signals traditionally demands a deep understanding of …

Read Story

A Comprehensive Guide to Data Center Outsourcing (DCO)

Data Center Outsourcing

Outsourcing data storage to third-party providers is a trend gaining significant momentum across organizations worldwide. Adopting this strategy brings a plethora of benefits, including significant monetary savings, improved flexibility, and a notable decrease in operational responsib …

Read Story

Password Complexity – Going Beyond the Minimum Requirements

Password Complexity – Going Beyond the Minimum Requirements

As the frequency and scale of cyberattacks has risen sharply over the past decade, we as end users have been repeatedly asked (and often required) to increase the complexity of our passwords. Back when the internet was in its infancy, the idea of creating a complex and tough-to-guess …

Read Story

Subscribe by email