Sully Perella is a Senior Manager at Schellman who leads the PIN and P2PE service lines. His focus also includes the Software Security Framework and 3-Domain Secure services. Having previously served as a networking, switching, computer systems, and cryptological operations technician in the Air Force, Sully now maintains multiple certifications within the payments space. Active within the payments community, he helps draft new payments standards and speaks globally on payment security.
Cybersecurity Assessments | Artificial Intelligence
By:
Sully Perella
October 15th, 2025
People interact with Artificial Intelligence (AI) in a number of ways, but notably, written prompts are the main method because basic prompt hacking is understood. Now, let's talk about sophisticated attacks targeting enterprise AI systems. These considerations will explain how an attacker can weaponize AI assistants to extract proprietary data, manipulate business decisions, or pivot through corporate networks.
By:
Sully Perella
October 6th, 2025
If you thought developing and implementing your AI system was a challenge, just wait until you attempt to ensure your AI system complies with conflicting international laws simultaneously.
By:
Sully Perella
September 23rd, 2025
Though servers have typically been the norm among organizations since the inception of the computer, there’s been a slow transition through different architecture since then. Though going serverless has been the latest trend within the last decade, many still have plenty of questions regarding this potential option.
By:
Sully Perella
September 16th, 2025
The S&P study on Generative AI asserts that, “The percentage of companies abandoning the majority of their AI initiatives before they reach production has surged from 17% to 42% year over year, with organizations on average reporting that 46% of projects are scrapped between proof of concept and broad adoption.”
By:
Sully Perella
November 7th, 2024
Scoping is a key first step in any compliance assessment, and those who have been through the process understand how vital—and how tricky—it can be. Scoping is particularly crucial in PCI DSS, as drawing your boundaries largely determines which requirements your organization must satisfy, and when you’re operating within a Zero Trust environment, things appear to get more complicated.
Cybersecurity Assessments | Artificial Intelligence
By:
Sully Perella
October 31st, 2024
Artificial intelligence (AI)—you’ve heard of it, you’re likely using it, and you know it’s already used everywhere and its reach will only likely increase. These days, the term "AI" is thrown around frequently, but because this technology is actually made up of many different subsets that generally all get thrown under the umbrella of AI, it can sometimes lead to confusion.
By:
Sully Perella
October 2nd, 2024
Though so much attention has been placed on secure coding to mitigate cyber threats to software, another emerging area of focus is the “software supply chain,” or the “software bill of materials” (SBOM). Why? Because software security doesn’t just depend on secure coding—the individual components of the software, or the SBOM—are equally critical.
Cybersecurity Assessments | Quantum
By:
Sully Perella
January 24th, 2024
Like all evolutions in technology, quantum computing promises to revolutionize problem-solving and to do so at speeds that are unimaginable for classic computers we know. However, this technological advancement also poses a significant threat to our current cryptographic systems and algorithms that underpin how the world protects and verifies information.