Security professional
Upskilling employees: How to overcome the top barriers
Upskilling employees? We found the top barriers to upskilling—and tips on how to overcome them—for technologists, tech...
Red, blue, and purple teams: Cybersecurity roles explained
Red teams attack, blue teams defend, and purple teams combine approaches. Learn why cybersecurity roles are divided and...
Tech in 2023: The top trends to watch closely this year
Here are the emerging trends you should expect over the next 12 months, and how it might affect you and your business.
Work in tech? The top soft skills to develop in 2023
Soft skills matter in tech more than you think. Here's the most important skills every professional should develop,...
Pluralsight’s top tech certifications for 2023
Looking to get more certifications? Here's a list of the top certs to take in cloud, cybersecurity, dev, and more. We...
Keep an eye out for these top tech careers in 2023
The top tech careers to consider if you're after a higher salary, as well as the cities in the world where you'll have...
Pluralsight’s top tech skills for 2023
Looking to keep your skills relevant in 2023? Here are the top tech talents you might want on your resume, and how to...
Pluralsight 2022: The Year in Tech
A tech retrospective of 2022: The most popular programming languages and technologies, what professionals were...
10 tech articles our readers loved in 2022
These were the articles that resonated most with our talented tech audience (that's you!) in 2022. We've also listed...
Information Security: Is it a good career for you?
Thinking about getting into information security. Here’s what to expect if you’re looking to get into the field, and...
Getting a cybersecurity job: How to showcase your transferable skills
No matter what your current profession is, it's possible to get a career in cybersecurity so long as you've got a...
Want to get into Cybersecurity? Here’s the (public) key
It’s possible to break into information security no matter where you are in your professional career - here’s how.
Endpoint security and cloud architecture
Endpoint security protects enterprises by safeguarding end-user devices from breach or physical theft. Learn how cloud...
World Podcast Day: 5 top podcasts for IT & tech pros
It’s World Podcast Day! To celebrate, we’ve put together a list of great podcasts you should listen to, compiled by...
Preventing advanced persistent threat (APT) attacks
Terumi defines an advanced persistent threat attack and discusses steps you can take to prevent an APT attack or...
Perspectives in Leadership: Evaluating DevSecOps Tools
Pluralsight sat down with Shea Stewart from Gigaom to discuss evaluating DevSecOps tools, solution architecture,...
Do corporate universities create a competitive advantage?
Corporate Universities are gaining popularity as employers move to centralized training functions so they can align...
8 benefits of insourcing: Filling tech roles from within
Insourcing (sourcing talent internally) reduces attrition and helps you staff mission-critical software, IT and data...
Test-driven development: Avoiding implementation mistakes
Test-driven development reduces rework and associated costs. Learn about TDD benefits, downsides, & barriers to...
Developer onboarding checklist: 8 best practices
Effective developer onboarding programs have eight key elements. Do you have a plan for each element and all work...
Multicloud pros and cons
Multicloud investments are common but risky for organizations. Cloud guru Scott Pletcher explains the pros and cons of...
Technical debt poses a cybersecurity risk
Get a layperson’s explanation of “technical debt” and the implications for business leaders in this brief interview...
The state of tech: 4 tough questions about change in the shadow of COVID-19
Technology experts discuss COVID-19’s lingering impact on the way we work, the biggest issues and opportunities the...
5 essential fintech skills organizations need to develop now
Learn what fintech skills are more critical to organizations now than ever before, including DevSecOps, AI/ML, data,...
Your 2021 cybersecurity playbook
Cybersecurity in 2021 is all about deploying solutions to help users avoid cyberattacks by providing additional...
The ultimate guide to tech certifications
With coverage for the top cloud, IT, security and project management certifications around the world, Pluralsight has...
Pluralsight video tips: Customizing your learning journey
Learn how to set a goal, use a path and create custom learning channels to improve your technology skill development,...
Step-by-Step Docker Build: Custom ASP.NET Core Containers
Using Dockerfiles in your Docker build, you can create custom images deployed within containers. Docker images hold...
The 5 pillars of cloud security
Cloud security is a shared responsibility between cloud providers and organizations. Learn how it works and how your...
Cloud Transformation Day: 5 Challenges of Cloud Computing
Pluralsight’s Aaron Skonnard sits down with Google Cloud’s VP of Migrations, Stephen Orban, to talk about the...
Live at AWS re:Invent: Building a talent pipeline
Talent pipelines help leaders develop skills they need from talent they already have. Join Pluralsight as we discuss...
What you missed at Pluralsight’s Cloud Transformation Day
Pluralsight’s Cloud Transformation Day 2022 brought in some of the leading cloud experts to talk about successful cloud...
Enterprise cybersecurity: 4 roles your organization needs
When it comes to enterprise cybersecurity, you need to stay on top of the ever-changing threat landscape with...
6 best cybersecurity tools to prevent cyber attacks
As cyber attacks grow more sophisticated, you need to stay one step ahead. Discover the 6 best cybersecurity tools to...
AWS re:Invent: Cloud-based talent management strategies
At AWS re:Invent 2022, Pluralsight’s Drew Firment, Head Cloud Strategist, shared the three phases of building a...
A day in the life of a threat hunter
In cybersecurity, threat hunters proactively search an organization’s systems, networks, and infrastructure for threats...
What is a penetration tester? | Pluralsight
A penetration tester simulates cyber attacks and exploits cybersecurity weaknesses to find vulnerabilities before bad...
A day in the life of a SOC analyst
SOC analysts, or Security Operations Center analysts, regularly monitor and investigate security alerts. Learn about...
A day in the life of an incident responder
Incident responder is a type of cyber security job responsible for mitigating immediate cyber threats. To learn more,...
Expert insights and strategies from the 2022 State of Cloud report
Get the inside scoop on Pluralsight’s 2022 State of Cloud report. Spoiler: leaders want more, but the workforce must...
9 overlooked steps to create a successful cloud migration strategy
A successful cloud migration strategy includes these 9 most overlooked steps. Make sure you’ve covered all your bases...
Zero Trust: 3 tips for government agencies
When it comes to Zero Trust, where do you start? Our Sr. Security Author Brandon DeVault shares top tips to help...
Data pipeline Q&A
We recently fielded questions about data pipelines and transformation. Here’s some advice for any organization looking...
5 key takeaways from RSA Conference 2022
Cybersecurity experts weigh in on the 5 key takeaways from RSA Conference 2022 that you need to know about.
Reinforced self-paced learning: sticky training for new tech skills
When employees need new tech skills to support a significant digital transformation, organizations benefit from...
10 tips for honing cybersecurity intuition
Security team members must hone a variety of skills. Cybersecurity training can jumpstart this process, but one key...
Prioritizing cybersecurity
Prioritizing cybersecurity is ultimately about people, processes and technology (in that order). Well-trained humans...
Zero Trust Strategy: Part 3 Devices
In Zero trust strategy Part 3, we'll be taking a deeper look at the second of CISA's five pillars: Devices.
Day of Shecurity Conference 2022 recap: Breaking into cybersecurity, avoiding burnout, and overcoming imposter syndrome
Pluralsight's Bri Frost Andersen shares her top takeaways from the 2022 Day of Shecurity Conference. We learn about how...
Reskilling programs: Preparing non-tech employees for tech roles
Where do you begin when reskilling non-tech employees for software development jobs? Start with this three-step...
Key Criteria for Evaluating DevSecOps Tools
In this report, tech decision makers will learn what they need to look for as they address the security of...
Zero Trust Strategy: What is Zero Trust Architecture?
Zero Trust has become a constantly used "buzzword" and depending on who you ask, their definition of zero trust can be...
How do superstar software developers affect team morale?
Having a superstar on your software development team is great—but it also comes with a unique set of challenges. Here’s...
Top influencer reshapes the learning platform conversation
Pluralsight Skills is the first 100% skills learning platform ever to break into the CWG Top 10 Learning Systems...
5 tips for talking tech with non-technical decision makers
Equip yourself to present proposed technical solutions in a compelling, understandable way—and get your CEO and CFO on...
Career growth requires career development
Career development can help you reach your career growth goals. In this interview, Jeff Moore shares insights on how to...
Log4J Vulnerability: Security Flaw and Solution
Businesses across the globe were impacted by the Log4j vulnerability. Learn about what this vulnerability is and how to...
8 things you can accomplish in a few hours on Pluralsight
If you're a technology professional trying to figure out what you should explore on Pluralsight first, here's your...
Acquiring DevelopIntelligence and launching new experiences to help you build better
See how new releases and improvements to Pluralsight Flow and Skills can help transform your team into your competitive...
048 - From soldier to IT specialist with Ryan Chasteauneuf
Ryan Chasteauneuf had always dreamed of being a soldier. But after disaster struck in Afghanistan, his military career...
Cybersecurity: Must-have control practices
Whether you’re starting a new cybersecurity practice or refreshing an existing one, here are the fundamental...
Webinar | Inclusive, accessible principles for product teams
Learn how to make better products using inclusive and accessible principles from Pivotal Labs’ Senior Designer Raquel...
6 fundamentals of multi-cloud security
While enterprises become more and more reliant on cloud technologies, these six fundamentals will keep your...
How to skill up on Pluralsight in 10 minutes or 10 days
Pluralsight has a variety of ways you can skill up regardless of the amount of time you have. To help you make the most...
How the Pluralsight community is skilling up during COVID-19
Here are ten of our favorite ways people have been using Pluralsight to stay home and skill up during Free April.
Must-watch technology courses
Using insights from the Pluralsight Tech Index—which shows the relative popularity of the world’s top...
Soft skills for remote instruction, teaching and discussion
When you switch from instructing in person to instructing virtually, you might feel overwhelmed by how much is...
The perfect time to study for security professional certification exams
Prepare for your professional security certification exam with expert-curated paths and courses in the skills you need...
Career guide: Start and grow your career in tech
Get insights and advice from leading technology experts on how you can best start and grow your tech career.
7 security threats introduced by COVID-19 and the WFH rush
COVID-19 prompted many companies to quickly transition to WFH environments, creating security vulnerabilities. Find out...
The secret to creating your own career-defining moments
Advance your career by creating your own opportunities with these five steps.
What to do before, during and after your next interview to stand out
Want to land the tech job of your dreams? Here are 10 tips to help you prepare for your interview.
10 tips to give your resume the edge
Learn how to make your resume in software development, IT, data, cloud or security shine with 10 tips from experts in...
The Remote Work Guide
“How do I work from home effectively?” This guide will provide you with helpful tips on how you can collaborate and get...
019 - Security with Troy Hunt
Security legend Troy Hunt joins us to discuss the Jeff Bezos phone hack, election threats, Huawei, Have I Been Pwned...
4 reasons to not go multicloud: data storage, vendor lock-in, and multicloud security
A multicloud strategy isn't for everyone. Between managing vendor lock in, data storage choices, and multicloud...
4 reasons to not go multicloud: data storage, vendor lock-in, and multicloud security
A multicloud strategy isn't for everyone. Between managing vendor lock in, data storage choices, and multicloud...
Cybersecurity threats and trends in 2020
Threats like ransomware and IoT vulnerabilities aren’t going anywhere. Dive into the cybersecurity threats and trends...
6 steps to effective incident response
6 Steps to Effective Incident Response with cybersecurity expert Dale Meredith
How to maintain secure coding practices
See how Acxiom uses Pluralsight channels to keep secure coding practices up-to-date, give teams annual skill...
The AI ethics strategy guide
There are many schools of thought on what constitutes “good” and “bad” AI. This report will show you how to reach...
You're compromising your company's security. Here's how
Join cybersecurity expert and Pluralsight author Dale Meredith for a live event with in-depth discussion, tips to...
5 steps for implementing DevSecOps
Embed DevSecOps into your organization with these five crucial steps.
Webinar: Cloud computing data protection and privacy
Learn what you need to know for your company to adopt cloud computing—and avoid criminal punishments and civil fines.
One year of GDPR: What we’ve learned, and what’s next
Whether you were an org leader, IT professional or just a consumer, it seemed every technology conference, company,...
4 steps for creating a company IoT policy
What’s the problem with IoT devices in the office? Security. Reduce the risk in 4 “smart” steps.
On-demand Webinar:Adopting DevSecOps: The Holy Grail of sustainable security
A classic security strategy isn’t going to cut it anymore. It’s time to move from outdated security approaches and see...
New normal: Today's best practices for passwords
The new password best practices released by The National Institute of Science and Technology outline password...
ICS + Pluralsight
ICS provides secure data services to the federal government, as well as state and local municipalities, and they do it...
Are you giving gifts that give away data?
When you’re looking for gifts for developers and IT pros (or even your non-technical loved ones), are you taking these...
Cyber security Threats and Trends
What you can expect to see in the cyber security world as we enter a new year of increasingly complex threats. Check...
4 essential skills for a Security Analyst
Today’s rapid growth of technology is closely followed by the booming threat of cybercrime, driving demand for more...
Webinar: GDPR: From program to business as usual
What is your enterprise GDPR strategy? Information security expert John Elliott reveals GDPR tactics and planning as we...
The procrastinator’s guide to the General Data Protection Regulation
This General Data Protection Regulation (GDPR) compliance checklist outlines data protection strategies and GDPR...
5 steps for GDPR compliance
Don’t get caught off-guard. General Data Protection Regulation (GDPR) is coming and it will affect your international...
Information and cyber security: 5 trends to watch in 2018
Discover the information and cyber security trends that will have the biggest security impact on enterprises in 2018.
Trend watch: 7 keys to the future of web applications
Master the technologies that matter most in 2018 with a round-up from John Papa in this guide.
Top 5 excuses for insufficient cybersecurity budgets
There are plenty of excuses for an insufficient security budget. Expert Dale Meredith talks through the top 5 and how...
The real cost of a security breach
The average cost of a data breach is $17 million. Find out the real cost of security threats and how to prevent data...
Ask the expert: Troy Hunt talks HTTPS
If your organization isn’t using HTTPS, it should be. Expert Troy Hunt talks through barriers to adoption and more...
4 Ways to Protect Your Data & Bottom Line
Combining industry data and knowledge from Pluralsight’s subject matter experts, we’ve outlined four ways you can...
Incident response: Details in the data
Incident response is no longer an optional part of your business strategy. Learn more about what IR is and why data is...
WannaCry ransomware attack: Well, here’s your problem…
Was WannaCry completely preventable? Pluralsight author Tim Warner gives his take on making ransomware attacks more...
5 lessons from WannaCry your organization needs to adopt now
The world is still recovering from WannaCry, and while some details are still unknown, we've got 5 lessons your...
Infographic | Smartphone Security: How to Keep Enterprise Data Safe in 2016
Security expert and Pluralsight author, Dale Meredith, explains how to protect your enterprise from hackers by focusing...
Guide | Security Risks
We asked security specialist and incident response expert, Matt Walker, to go beyond the typical top-10 lists and share...
Webinar | NextGen Security
Among the very interesting security topics of 2016, two stand out. First, the introduction of DevOps in the...
Webinar | cyber security
Don’t miss Pluralsight author, and founder of HaveIBeenPwnded.com, Troy Hunt in his new on-demand webinar, Cyber...
Guide | 3 ways to make time for learning
Setting aside time for your team to train can actually save time. Here’s how to build a culture of learning within your...
Webinar | Builders vs Breakers: 10 Online Attacks that we could have Easily Prevented
In this webinar, security expert and Pluralsight author Troy Hunt shares 10 examples of recent online attacks, assesses...
Guide | Choosing the right e-learning provider and getting buy-in from your organization
In this guide you learn what to look for in an e-learning provider, how you can motivate your staff to use the...
Guide | Effectively Launching and Using Video Training in Your Studio or Company
If you’re looking to implement video training into your studio, there are some important elements to know from the...
Guide | tech skills of tomorrow
Build an organization-wide technology strategy with confidence by focusing on the skills you’ll need to succeed in an...
Guide | 5 steps for implementing DevSecOps
Wherever your agency is on its DevOps journey, the security of your infrastructure is vital. Learn how to embed a...
Pluralsight One + Teach For America
Teach For America recruits and develops teachers to support low income communities. Technology drives its mission, but...