Peter Fellini

Peter Fellini

Peter Fellini is AVP of Cybersecurity with Compass Cyber Guard. Peter has over 20 years of experience in a variety IT Security fields such as Ethical Hacking, Social Engineering, and Auditing. He has a Masters of Science in Education as well as industry certifications including Certified Information Systems Security Professional (CISSP), Social Engineering Pentest Professional (SEPP), Offensive Security Wireless Professional (OSWP), PCI Professional (PCIP), etc. Peter has competed multiple times at DefCon's Social Engineering Village in the SECTF challenge. He is also attending school part-time at Johnson & Wales University to become a professional craft beer brewer. Learn more about Peter in his employee spotlight video: https://www.youtube.com/watch?v=IetH-ty93CQ

Posts by Peter Fellini

Chinese RedNote App Rises Amid TikTok Ban: New Privacy Concerns

Chinese RedNote App

As TikTok faces a looming ban in the United States, a new player has emerged on the social media stage: RedNote. Known as Xiaohongshu (Little Red Book) in China, RedNote has skyrocketed in popularity, especially among American users seeking alternatives. However, its meteoric rise com …

Read Story

Domain Name Server (DNS) Hijacking Defined

DNS Hijacking

The Domain Name System (DNS) serves as the backbone of internet communication, translating human-readable domain names into machine-readable IP addresses. Despite its importance, DNS is often targeted by malicious actors due to vulnerabilities that can compromise its integrity. One of …

Read Story

What Is the OSI Model? 7 Layers Explained

OSI Model Explained

Networking can seem like a complex web of processes and protocols, but the OSI model simplifies this by breaking it into well-defined layers. Understanding the OSI model is essential for anyone involved in IT, as it serves as a universal framework for how data is transmitted, processe …

Read Story

Cybersecurity Acronyms You Need to Know – Glossary

Cybersecurity Glossary

In the world of cybersecurity, keeping up with the latest trends and terminology is essential. Whether you are an industry veteran or just starting to explore the field, understanding the key terms can make a significant difference in grasping the complexities of this ever-evolving la …

Read Story

Internal vs External Penetration Testing: What's The Difference?

Internal vs External Pen Test

A penetration test, also known as a pen test, is a controlled, simulated cyberattack designed to uncover vulnerabilities that could be exploited in an organization's security. These tests can be carried out either internally or externally. Understanding the difference between internal …

Read Story

What to Do if Your Elderly Parent Is Being Scammed

Elderly Parent Being Scammed

Scams targeting seniors are on the rise, as fraudsters increasingly exploit the vulnerabilities of older adults. Many individuals are now seeking effective ways to protect their elderly parents from these malicious schemes, aiming to safeguard their financial security and well-being. …

Read Story

Subscribe by email