This week, members of LinkedIn’s security team descended on Las Vegas to participate in Black Hat. My colleague Cory and I presented a talk on building a solid tactical security program. We’ve offered some of the key insights here, for those unable to attend, as well as some questions we got afterward, at the bottom of this post. How To Be Tactical At LinkedIn,...
-
- Topics:
- Black Hat
-
The field of information security continues to grow and diversify as the impact of Internet and computer security expands to every corner of our lives. We took a deep dive into the talent pool of information security professionals on LinkedIn to determine what insights we could glean on the changes in our industry over the last few years. We presented the first...
- Topics:
- Jobs
-
Earlier this week, we turned off our CSV connections download tool and asked our members to use another data export process as part of our ongoing efforts to combat the inappropriate export of member data by third parties. This process delivered more data but took longer, usually 24 hours but in some cases up to 72 hours. Since that change, we’ve heard you loud...
- Topics:
- Announcements,
- Privacy,
- Member data
-
We have turned the tool back on. You can read more in our new post here. LinkedIn is a members-first company and we believe that the...
- Topics:
- Announcements,
- Member data
-
Professionals and companies around the world use LinkedIn to network, post and engage with others in their professional community. The...
- Topics:
- Member data
-
One of the best ways we protect our members is by identifying vulnerabilities prior to launch through a careful design review and...
- Topics:
- Bug bounty