What are you
interested in?
36 posts
Meet Romy: A nature lover who thrives on challenges (like her rabbits)
The Ups and Downs of Our First "Out of the (Gift) Box" Campaign
Written by Silje Knudtzon
Meet Michael: A DIY enthusiast who can't live without Julmust
One year of Pistachio
Written by Erlend Blix Seppola
CrowdStrike and the Standards We Rely On
Written by Zack Korman
Drawing the Line on Automation
Written by Zack Korman
Meet Denise: A fearless athlete with a soft spot for New Jersey bagels
How We Crafted 45 Brands in Two Weeks
Written by Oleksandr Levchenko
Why Don't Employees Care About Security Awareness?
Written by Rebecca Friedemann
Unveiling Cybersecurity Myths and Misconceptions
Spoofing Attacks - Identification and Prevention
Playing Corporate Politics for Cybersecurity
Written by Zack Korman
The Art and Science of Automating Phishing Simulations
Written by Zack Korman
HTTPS Does Not Mean Safe
Written by Kasper Rynning-Tønnesen
Pistachio’s 2023 Year in Review
Collecting Our Tracks With Deployment Events
Written by Carina Eikaas
Click Rate Is a Terrible Metric for Phishing Simulations
Written by Zack Korman
QR Code Scanners: Are They Safe?
Non-Actionable Insights: Using Data to Do Less, Not More
Written by Carina Eikaas
Cookie Tracking and Online Privacy: How to Protect Your Digital Footprint
Security Awareness Has a Control Problem
Written by Zack Korman
Developers Are Imperfect, and Cybersecurity Is Unforgiving
Written by Zack Korman
Smishing Scams: Protecting Your Mobile Privacy
The Case Against Feature-Based Pricing
Written by Zack Korman
The Source of SaaS Bloat: How to Stop Buying the Wrong Products
Written by Zack Korman
Announcement: Pistachio Raises €3.25m!
The Rise of Phishing Voicemails: Understanding the Threat Landscape
From Likes to Threats: The Risks of Oversharing on Social Media
You Can’t Gamify Security Awareness
Written by Zack Korman
The Role of AI in Cybersecurity: Use Cases and Challenges
Enhancing Cyber Resilience: NIS2 and Its Implications for Security Awareness
Think Twice Before Whitelisting for Attack Simulations
Written by Zack Korman
Cybersecurity in The Age of Remote Work: How To Adapt Your Training for a Changing Landscape
How Do We Solve AI Prompt Injection Attacks? It’s a Secret
Written by Zack Korman