LinkedIn Security Blog

  • Exploring the Information Security Talent Pool

    August 4, 2015

    The field of information security continues to grow and diversify as the impact of Internet and computer security expands to every corner of our lives. We took a deep dive into the talent pool of information security professionals on LinkedIn to determine what insights we could glean on the changes in our industry over the last few years. We presented the first...

  • Turning Our CSV Connections Download Tool Back On

    July 25, 2015

    Earlier this week, we turned off our CSV connections download tool and asked our members to use another data export process as part of our ongoing efforts to combat the inappropriate export of member data by third parties. This process delivered more data but took longer, usually 24 hours but in some cases up to 72 hours. Since that change, we’ve heard you loud...

  • Access to Your Account Data

    July 24, 2015

    We have turned the tool back on. You can read more in our new post here. LinkedIn is a members-first company and we believe that the data you enter into LinkedIn is yours and you should be able to access it. We’ve had a bunch of questions on a change we made earlier this week regarding access to your account data and wanted to clarify a few things. To be clear,...

  • Keeping Members Secure

    July 14, 2015

    Professionals and companies around the world use LinkedIn to network, post and engage with others in their professional community. The...

  • LinkedIn’s Private Bug Bounty Program

    June 17, 2015

    One of the best ways we protect our members is by identifying vulnerabilities prior to launch through a careful design review and...

  • A Look into Netty’s Recent Security Update (CVE­-2015­-2156)

    May 15, 2015

    As part of our ongoing effort to secure our applications and contribute back to the community, the LinkedIn House Security team is...