What are you
interested in?
32 posts
![Microsoft Blue Sceen of Death](/bucket/images/website/blog/posts/crowdstrike-and-the-standards-we-rely-on/card.jpg)
CrowdStrike and the Standards We Rely On
Written by Zack Korman
![Pink button](/bucket/images/website/blog/posts/drawing-the-line-on-automation/card.jpg)
Drawing the Line on Automation
Written by Zack Korman
![Denise Castelli Portrait](/bucket/images/website/blog/posts/employee-spotlight-denise/card.jpg)
Meet Denise: A fearless athlete with a soft spot for New Jersey bagels
![Icons book](/bucket/images/website/blog/posts/how-we-crafted-45-brands-in-two-weeks/card.jpg)
How We Crafted 45 Brands in Two Weeks
Written by Oleksandr Levchenko
![running track](/bucket/images/website/blog/posts/why-do-employees-not-care-about-security-awareness/card.jpg)
Why Don't Employees Care About Security Awareness?
Written by Rebecca Friedemann
![man walking through shadows](/bucket/images/website/blog/posts/unveiling-cybersecurity-myths-and-misconceptions/card.jpg)
Unveiling Cybersecurity Myths and Misconceptions
![masks](/bucket/images/website/blog/posts/spoofing-attacks-identification-prevention/card.jpg)
Spoofing Attacks - Identification and Prevention
![chess](/bucket/images/website/blog/posts/corporate-politics-cybersecurity/card.jpg)
Playing Corporate Politics for Cybersecurity
Written by Zack Korman
![Mailboxes](/bucket/images/website/blog/posts/the-art-and-science-of-automating-phishing-simulations/card.jpg)
The Art and Science of Automating Phishing Simulations
Written by Zack Korman
![Hooked padlock](/bucket/images/website/blog/posts/https-does-not-mean-safe/card.jpg)
HTTPS Does Not Mean Safe
Written by Kasper Rynning-Tønnesen
![2023 Year in Review Image](/bucket/images/website/blog/posts/end-of-2023-recap/card.jpg)
Pistachio’s 2023 Year in Review
![Chart graph](/bucket/images/website/blog/posts/collecting-our-tracks-with-deployement-events/card.jpg)
Collecting Our Tracks With Deployment Events
Written by Carina Eikaas
![mouse on desk](/bucket/images/website/blog/posts/click-rate-is-a-terrible-metric-for-phishing-simulations/card.jpg)
Click Rate Is a Terrible Metric for Phishing Simulations
Written by Zack Korman
![Smart phone with displaying message apps](/bucket/images/website/blog/posts/qr-code-scanners-are-they-safe/card.jpg)
QR Code Scanners: Are They Safe?
![light bulb](/bucket/images/website/blog/posts/non-actionable-insights-using-data-to-do-less-not-more/card.jpg)
Non-Actionable Insights: Using Data to Do Less, Not More
Written by Carina Eikaas
![Footprints on ribbed sandy cost](/bucket/images/website/blog/posts/cookie-tracking-and-online-privacy-how-to-protect-your-digital-footprint/card.jpg)
Cookie Tracking and Online Privacy: How to Protect Your Digital Footprint
![A camera mounted to the side of a wall](/bucket/images/website/blog/posts/security-awareness-has-a-control-problem/card.jpg)
Security Awareness Has a Control Problem
Written by Zack Korman
![Computer screen error](/bucket/images/website/blog/posts/developers-are-imperfect-and-cybersecurity-is-unforgiving/card.jpg)
Developers Are Imperfect, and Cybersecurity Is Unforgiving
Written by Zack Korman
![Smart phone with displaying message apps](/bucket/images/website/blog/posts/smishing-scams-protect-your-mobile-privacy/card.jpg)
Smishing Scams: Protecting Your Mobile Privacy
![A leather wallet with credit cards](/bucket/images/website/blog/posts/the-case-against-feature-based-pricing/card.jpg)
The Case Against Feature-Based Pricing
Written by Zack Korman
![Person working on computer](/bucket/images/website/blog/posts/the-source-of-saas-bloat/card.jpg)
The Source of SaaS Bloat: How to Stop Buying the Wrong Products
Written by Zack Korman
![The Pistachio team](/bucket/images/website/blog/posts/pistachio-raises-3-25million/card.jpg)
Announcement: Pistachio Raises €3.25m!
![EarPods lying on phone](/bucket/images/website/blog/posts/the-rise-of-phishing-voicemails/card.jpg)
The Rise of Phishing Voicemails: Understanding the Threat Landscape
![Person taking a photo](/bucket/images/website/blog/posts/from-likes-to-threats-the-risks-of-oversharing-on-social-media/card.jpg)
From Likes to Threats: The Risks of Oversharing on Social Media
![Game over](/bucket/images/website/blog/posts/you-cant-gamify-security-awareness/card.jpg)
You Can’t Gamify Security Awareness
Written by Zack Korman
![Person on phone](/bucket/images/website/blog/posts/the-role-of-ai-in-cybersecurity-use-cases-and-challenges/card.jpg)
The Role of AI in Cybersecurity: Use Cases and Challenges
![European flag](/bucket/images/website/blog/posts/enhancing-cyber-resilience/card.jpg)
Enhancing Cyber Resilience: NIS2 and Its Implications for Security Awareness
![Closeup iphone](/bucket/images/website/blog/posts/think-twice-before-whitelisting-for-attack-simulations/card.jpg)
Think Twice Before Whitelisting for Attack Simulations
Written by Zack Korman
![Woman on computer](/bucket/images/website/blog/posts/cybersecurity-in-the-age-of-remote-work/card.jpg)
Cybersecurity in The Age of Remote Work: How To Adapt Your Training for a Changing Landscape
![Girl on computer](/bucket/images/website/blog/posts/how-do-we-solve-ai-prompt-injection-attacks-it-is-a-secret/card.jpg)
How Do We Solve AI Prompt Injection Attacks? It’s a Secret
Written by Zack Korman
![Man in forest](/bucket/images/website/blog/posts/the-future-of-cybersecurity-trends-and-predictions-for-2024-and-beyond/card.jpg)
The Future of Cybersecurity: Trends and Predictions for 2024 and Beyond
![Girl on phone](/bucket/images/website/blog/posts/the-art-of-phishing-how-hackers-trick-your-employees/card.jpg)
The Art of Phishing: How Hackers Trick Your Employees
We believe in a learn-by-doing approach over snooze-worthy videos.
Instead, Pistachio tailors real-world scenarios so your team can build their cyber skills in a safe environment.
![we believe in a learn by doing approach over snooze worthy videos](/bucket/images/website/ctas/we-believe-in-a-learn-by-doing-approach-over-snooze-worthy-videos-2.png)