LinkedIn Security Blog

  • Debrief from Black Hat - The Tactical Application Security Program

    August 7, 2015

    This week, members of LinkedIn’s security team descended on Las Vegas to participate in Black Hat. My colleague Cory and I presented a talk on building a solid tactical security program. We’ve offered some of the key insights here, for those unable to attend, as well as some questions we got afterward, at the bottom of this post. How To Be Tactical At LinkedIn,...

  • Exploring the Information Security Talent Pool

    August 4, 2015

    The field of information security continues to grow and diversify as the impact of Internet and computer security expands to every corner of our lives. We took a deep dive into the talent pool of information security professionals on LinkedIn to determine what insights we could glean on the changes in our industry over the last few years. We presented the first...

  • Turning Our CSV Connections Download Tool Back On

    July 25, 2015

    Earlier this week, we turned off our CSV connections download tool and asked our members to use another data export process as part of our ongoing efforts to combat the inappropriate export of member data by third parties. This process delivered more data but took longer, usually 24 hours but in some cases up to 72 hours. Since that change, we’ve heard you loud...

  • Access to Your Account Data

    July 24, 2015

    We have turned the tool back on. You can read more in our new post here. LinkedIn is a members-first company and we believe that the...

  • Keeping Members Secure

    July 14, 2015

    Professionals and companies around the world use LinkedIn to network, post and engage with others in their professional community. The...

  • LinkedIn’s Private Bug Bounty Program

    June 17, 2015

    One of the best ways we protect our members is by identifying vulnerabilities prior to launch through a careful design review and...