What are you
interested in?
Category
All
Tags
49 posts

Meet Michael: A people person who unwinds by diving into new worlds

Copilot Broke Your Audit Log, but Microsoft Won’t Tell You
Written by Zack Korman

The Case of Soham: The Cybersecurity Risk of Bad Hiring Practices
Written by Zack Korman

Meet Oleksandr: A creative mind cooking up great design and delicious meals

Cybersecurity training integrated with your team’s go-to apps

Try-catch; The GOTO that Needs to GOAWAY
Written by Kasper Rynning-Tønnesen

Pistachio Loop: Your regular check-in with cybersecurity

Meet Erlend: A developer who can troubleshoot anything but your wifi

Pistachio’s 2024 Year in Review

Meet Anda: A collector of sales deals and Lego sets

The Software Update Rant
Written by Paul Stølen

Meet Amine: A lifelong learner balancing business with martial arts

The Security News Source List

Meet Romy: A nature lover who thrives on challenges (like her rabbits)

The Ups and Downs of Our First "Out of the (Gift) Box" Campaign
Written by Silje Knudtzon

Meet Michael: A DIY enthusiast who can't live without Julmust

One year of Pistachio
Written by Erlend Blix Seppola

CrowdStrike and the Standards We Rely On
Written by Zack Korman

Drawing the Line on Automation
Written by Zack Korman

Meet Denise: A fearless athlete with a soft spot for New Jersey bagels

How We Crafted 45 Brands in Two Weeks
Written by Oleksandr Levchenko

Why Don't Employees Care About Security Awareness?
Written by Rebecca Friedemann

Unveiling Cybersecurity Myths and Misconceptions

Spoofing Attacks - Identification and Prevention

Playing Corporate Politics for Cybersecurity
Written by Zack Korman

The Art and Science of Automating Phishing Simulations
Written by Zack Korman

HTTPS Does Not Mean Safe
Written by Kasper Rynning-Tønnesen

Pistachio’s 2023 Year in Review

Collecting Our Tracks With Deployment Events
Written by Carina Eikaas

Click Rate Is a Terrible Metric for Phishing Simulations
Written by Zack Korman

QR Code Scanners: Are They Safe?

Non-Actionable Insights: Using Data to Do Less, Not More
Written by Carina Eikaas

Cookie Tracking and Online Privacy: How to Protect Your Digital Footprint

Security Awareness Has a Control Problem
Written by Zack Korman

Developers Are Imperfect, and Cybersecurity Is Unforgiving
Written by Zack Korman

Smishing Scams: Protecting Your Mobile Privacy

The Case Against Feature-Based Pricing
Written by Zack Korman

The Source of SaaS Bloat: How to Stop Buying the Wrong Products
Written by Zack Korman

Announcement: Pistachio Raises €3.25m!

The Rise of Phishing Voicemails: Understanding the Threat Landscape

From Likes to Threats: The Risks of Oversharing on Social Media

You Can’t Gamify Security Awareness
Written by Zack Korman

The Role of AI in Cybersecurity: Use Cases and Challenges

Enhancing Cyber Resilience: NIS2 and Its Implications for Security Awareness

Think Twice Before Whitelisting for Attack Simulations
Written by Zack Korman

Cybersecurity in The Age of Remote Work: How To Adapt Your Training for a Changing Landscape

How Do We Solve AI Prompt Injection Attacks? It’s a Secret
Written by Zack Korman

The Future of Cybersecurity: Trends and Predictions for 2024 and Beyond

The Art of Phishing: How Hackers Trick Your Employees
We believe in a learn-by-doing approach over snooze-worthy videos.
Instead, Pistachio tailors real-world scenarios so your team can build their cyber skills in a safe environment.
