Security professional

Cloud computing challenges and opportunities for the public sector

A look at the current challenges and opportunities facing public sector organizations as they hope to adopt cloud...

PCI DSS 4.0: A guide to making your organization compliant

The new version of the Payment Card Industry Data Security Standard becomes mandatory on 1st April 2024. Here's how to...

All about ChatGPT's first data breach, and how it happened

The data breach exposed the personal details of paid ChatGPT subscribers and shared their prompts with others. Here's...

Security reviews and AI models: How to decide what to greenlight

It's tricky to balance security without being branded a blocker. We cover how to review AI products, from checking the...

The perils of JavaScript: How we've broken the internet's security

JavaScript is powerful, but it also has data-leaking behaviors that can create problems for organizations, who need to...

Vulnerability Management: What it is, and how to go about it

We explain the anatomy of a cyberattack, how vulnerability management can be used to lower your organizational risk,...

2023 State of Upskilling: 45 more learning and development trends

From our 2023 State of Upskilling report, here are 45 more top trends in leadership, employee training and development,...

Passwordless vs Passwords: Stopping identity-related breaches

Passwords are far from a perfect solution when it comes to stopping identity-related breaches. But is using a...

RSAC 2023: Impressions of Dr. Hugh Thompson’s keynote

The theme for this year's keynote was the double-edged nature of technology, emerging advancements like AI, and where...

Why the AWS Certified Security - Specialty is worth getting

The SCS-C01 equips you to deal with many business challenges: securing infrastructure, automation, and (arguably)...

Experts share how to optimize your organization’s tech upskilling program

Mads Howard (Sage), Nick Russo (Cisco), and Chris Palmer (Pluralsight) share tips to help you optimize your...

5 Must-See Keynotes at the RSA Conference 2023

Whether you’re attending RSAC 2023 in person (or tuning in to the recorded presentations after they’re made) here’s...

Top tech skills, gaps, and barriers in APAC, EMEA, and the US

We surveyed technologists and tech leaders around the world. Here are the biggest upskilling barriers, gaps, and top...

RSA Conference 2023: Your Ultimate Survival Guide

Whether it’s your first time attending, or you’re a seasoned attendee wondering what to expect this year from the...

How to tackle the RSA Conference: Deciding what to attend

At the RSA Conference, there's no possible way to see and do everything. Here's our advice on how to figure out where...

Upskilling employees: How to overcome the top barriers

Upskilling employees? We found the top barriers to upskilling—and tips on how to overcome them—for technologists, tech...

Red, blue, and purple teams: Cybersecurity roles explained

Red teams attack, blue teams defend, and purple teams combine approaches. Learn why cybersecurity roles are divided and...

Tech in 2023: The top trends to watch closely this year

Here are the emerging trends you should expect over the next 12 months, and how it might affect you and your business.

Work in tech? The top soft skills to develop in 2023

Soft skills matter in tech more than you think. Here's the most important skills every professional should develop,...

Pluralsight’s top tech certifications for 2023

Looking to get more certifications? Here's a list of the top certs to take in cloud, cybersecurity, dev, and more. We...

Keep an eye out for these top tech careers in 2023

The top tech careers to consider if you're after a higher salary, as well as the cities in the world where you'll have...

Pluralsight’s top tech skills for 2023

Looking to keep your skills relevant in 2023? Here are the top tech talents you might want on your resume, and how to...

Pluralsight 2022: The Year in Tech

A tech retrospective of 2022: The most popular programming languages and technologies, what professionals were...

10 tech articles our readers loved in 2022

These were the articles that resonated most with our talented tech audience (that's you!) in 2022. We've also listed...

Information Security: Is it a good career for you?

Thinking about getting into information security. Here’s what to expect if you’re looking to get into the field, and...

Getting a cybersecurity job: How to showcase your transferable skills

No matter what your current profession is, it's possible to get a career in cybersecurity so long as you've got a...

Want to get into Cybersecurity? Here’s the (public) key

It’s possible to break into information security no matter where you are in your professional career - here’s how.

Endpoint security and cloud architecture

Endpoint security protects enterprises by safeguarding end-user devices from breach or physical theft. Learn how cloud...

World Podcast Day: 5 top podcasts for IT & tech pros

It’s World Podcast Day! To celebrate, we’ve put together a list of great podcasts you should listen to, compiled by...

Preventing advanced persistent threat (APT) attacks

Terumi defines an advanced persistent threat attack and discusses steps you can take to prevent an APT attack or...

Perspectives in Leadership: Evaluating DevSecOps Tools

Pluralsight sat down with Shea Stewart from Gigaom to discuss evaluating DevSecOps tools, solution architecture,...

Do corporate universities create a competitive advantage?

Corporate Universities are gaining popularity as employers move to centralized training functions so they can align...

8 benefits of insourcing: Filling tech roles from within

Insourcing (sourcing talent internally) reduces attrition and helps you staff mission-critical software, IT and data...

Test-driven development: Avoiding implementation mistakes

Test-driven development reduces rework and associated costs. Learn about TDD benefits, downsides, & barriers to...

Developer onboarding checklist: 8 best practices

Effective developer onboarding programs have eight key elements. Do you have a plan for each element and all work...

Technical debt poses a cybersecurity risk

Get a layperson’s explanation of “technical debt” and the implications for business leaders in this brief interview...

5 essential fintech skills organizations need to develop now

Learn what fintech skills are more critical to organizations now than ever before, including DevSecOps, AI/ML, data,...

Your 2021 cybersecurity playbook

Cybersecurity in 2021 is all about deploying solutions to help users avoid cyberattacks by providing additional...

The ultimate guide to tech certifications

With coverage for the top cloud, IT, security and project management certifications around the world, Pluralsight has...

Step-by-Step Docker Build: Custom ASP.NET Core Containers

Using Dockerfiles in your Docker build, you can create custom images deployed within containers. Docker images hold...

John Elliott on how to overcome the challenges of writing cybersecurity standards

Pluralsight author John Elliott, a veteran in the field of data privacy and security, discusses writing technical...

John Elliott on aligning GRC and pentesting for security assurance

John Elliott on tension between GRC and penetration testing, why orgs should pentest more often, and why to know why...

State of Cloud 2023: Cloud computing trends across tech

The current state of cloud computing for organizational leaders, including challenges, trends and key cloud services...

Using the cloud: Navigating risks and ensuring data security

What to look for in cloud security for leaders unsure about cloud computing: evaluate your ability to navigate risks...

How to determine if your team is ready for a multicloud environment

Considering a multicloud strategy? Learn how a lack of skills creates the obstacles organizations face in multicloud...

How to develop security policies for multicloud environments

Learn about the three pillars that make up a successful multicloud security strategy: abstraction, automation, and...

The 5 pillars of cloud security

Cloud security is a shared responsibility between cloud providers and organizations. Learn how it works and how your...

Cloud Transformation Day: 5 Challenges of Cloud Computing

Pluralsight’s Aaron Skonnard sits down with Google Cloud’s VP of Migrations, Stephen Orban, to talk about the...

Live at AWS re:Invent: Building a talent pipeline

Talent pipelines help leaders develop skills they need from talent they already have. Join Pluralsight as we discuss...

What you missed at Pluralsight’s Cloud Transformation Day

Pluralsight’s Cloud Transformation Day 2022 brought in some of the leading cloud experts to talk about successful cloud...

Enterprise cybersecurity: 4 roles your organization needs

When it comes to enterprise cybersecurity, you need to stay on top of the ever-changing threat landscape with...

6 best cybersecurity tools to prevent cyber attacks

As cyber attacks grow more sophisticated, you need to stay one step ahead. Discover the 6 best cybersecurity tools to...

AWS re:Invent: Cloud-based talent management strategies

At AWS re:Invent 2022, Pluralsight’s Drew Firment, Head Cloud Strategist, shared the three phases of building a...

A day in the life of a threat hunter

In cybersecurity, threat hunters proactively search an organization’s systems, networks, and infrastructure for threats...

What is a penetration tester? | Pluralsight

A penetration tester simulates cyber attacks and exploits cybersecurity weaknesses to find vulnerabilities before bad...

A day in the life of a SOC analyst

SOC analysts, or Security Operations Center analysts, regularly monitor and investigate security alerts. Learn about...

A day in the life of an incident responder

Incident responder is a type of cyber security job responsible for mitigating immediate cyber threats. To learn more,...

Expert insights and strategies from the 2022 State of Cloud report

Get the inside scoop on Pluralsight’s 2022 State of Cloud report. Spoiler: leaders want more, but the workforce must...

9 overlooked steps to create a successful cloud migration strategy

A successful cloud migration strategy includes these 9 most overlooked steps. Make sure you’ve covered all your bases...

How government agencies can build Zero Trust security models

Tips and timeline for government agencies developing Zero Trust security models against cyber threats, following the...

Data pipeline Q&A

We recently fielded questions about data pipelines and transformation. Here’s some advice for any organization looking...

5 key takeaways from RSA Conference 2022

Cybersecurity experts weigh in on the 5 key takeaways from RSA Conference 2022 that you need to know about.

Reinforced self-paced learning: sticky training for new tech skills

When employees need new tech skills to support a significant digital transformation, organizations benefit from...

10 tips for honing cybersecurity intuition

Security team members must hone a variety of skills. Cybersecurity training can jumpstart this process, but one key...

Prioritizing cybersecurity

Prioritizing cybersecurity is ultimately about people, processes and technology (in that order). Well-trained humans...

Zero Trust Strategy: Part 3 Devices

In Zero trust strategy Part 3, we'll be taking a deeper look at the second of CISA's five pillars: Devices.

Day of Shecurity Conference 2022 recap: Breaking into cybersecurity, avoiding burnout, and overcoming imposter syndrome

Pluralsight's Bri Frost Andersen shares her top takeaways from the 2022 Day of Shecurity Conference. We learn about how...

Reskilling programs: Preparing non-tech employees for tech roles

Where do you begin when reskilling non-tech employees for software development jobs? Start with this three-step...

Key Criteria for Evaluating DevSecOps Tools

In this report, tech decision makers will learn what they need to look for as they address the security of...

The pros and cons of a multicloud strategy

Multicloud investments are common but risky for organizations. Cloud guru Scott Pletcher explains the pros and cons of...

Zero Trust Strategy: What is Zero Trust Architecture?

Zero Trust has become a constantly used "buzzword" and depending on who you ask, their definition of zero trust can be...

How do superstar software developers affect team morale?

Having a superstar on your software development team is great—but it also comes with a unique set of challenges. Here’s...

Top influencer reshapes the learning platform conversation

Pluralsight Skills is the first 100% skills learning platform ever to break into the CWG Top 10 Learning Systems...

5 tips for talking tech with non-technical decision makers

Equip yourself to present proposed technical solutions in a compelling, understandable way—and get your CEO and CFO on...

Career growth requires career development

Career development can help you reach your career growth goals. In this interview, Jeff Moore shares insights on how to...

Log4J Vulnerability: Security Flaw and Solution

Businesses across the globe were impacted by the Log4j vulnerability. Learn about what this vulnerability is and how to...

Acquiring DevelopIntelligence and launching new experiences to help you build better

See how new releases and improvements to Pluralsight Flow and Skills can help transform your team into your competitive...

048 - From soldier to IT specialist with Ryan Chasteauneuf

Ryan Chasteauneuf had always dreamed of being a soldier. But after disaster struck in Afghanistan, his military career...

Cybersecurity: Must-have control practices

Whether you’re starting a new cybersecurity practice or refreshing an existing one, here are the fundamental...

Career guide: Start and grow your career in tech

Get insights and advice from leading technology experts on how you can best start and grow your tech career.

The secret to creating your own career-defining moments

Advance your career by creating your own opportunities with these five steps.

The Remote Work Guide

“How do I work from home effectively?” This guide will provide you with helpful tips on how you can collaborate and get...

019 - Security with Troy Hunt

Security legend Troy Hunt joins us to discuss the Jeff Bezos phone hack, election threats, Huawei, Have I Been Pwned...

4 reasons to not go multicloud: data storage, vendor lock-in, and multicloud security

A multicloud strategy isn't for everyone. Between managing vendor lock in, data storage choices, and multicloud...

4 reasons to not go multicloud: data storage, vendor lock-in, and multicloud security

A multicloud strategy isn't for everyone. Between managing vendor lock in, data storage choices, and multicloud...

6 steps to effective incident response

6 Steps to Effective Incident Response with cybersecurity expert Dale Meredith

5 steps for implementing DevSecOps

Embed DevSecOps into your organization with these five crucial steps.

Webinar: Cloud computing data protection and privacy

Learn what you need to know for your company to adopt cloud computing—and avoid criminal punishments and civil fines.

One year of GDPR: What we’ve learned, and what’s next

Whether you were an org leader, IT professional or just a consumer, it seemed every technology conference, company,...

On-demand Webinar:Adopting DevSecOps: The Holy Grail of sustainable security

A classic security strategy isn’t going to cut it anymore. It’s time to move from outdated security approaches and see...

New normal: Today's best practices for passwords

The new password best practices released by The National Institute of Science and Technology outline password...

ICS + Pluralsight

ICS provides secure data services to the federal government, as well as state and local municipalities, and they do it...

4 essential skills for a Security Analyst

Today’s rapid growth of technology is closely followed by the booming threat of cybercrime, driving demand for more...

The real cost of a security breach

The average cost of a data breach is $17 million. Find out the real cost of security threats and how to prevent data...

5 lessons from WannaCry your organization needs to adopt now

The world is still recovering from WannaCry, and while some details are still unknown, we've got 5 lessons your...

Guide | 3 ways to make time for learning

Setting aside time for your team to train can actually save time. Here’s how to build a culture of learning within your...

Guide | 5 steps for implementing DevSecOps

Wherever your agency is on its DevOps journey, the security of your infrastructure is vital. Learn how to embed a...

Pluralsight One + Teach For America

Teach For America recruits and develops teachers to support low income communities. Technology drives its mission, but...