Security Articles

  • high-level-system-architecture

    Fairness, Privacy, and Transparency by Design in AI/ML Systems

    July 26, 2019

    Co-authors: Stuart Ambler, Ahsan Chudhary, Mark Dietz, Sahin Cem Geyik, Krishnaram Kenthapadi, Ian Koeppe, Varun Mithal, Guillaume Saint-Jacques, Amir Sepehri, Thanh Tran, and Sriram Vasudevan Editor’s note: A shorter version of this article was originally posted by Krishnaram Kenthapadi on LinkedIn. Introduction How do we take fairness and transparency into...

  • authorization1

    Authorization at LinkedIn’s Scale

    March 19, 2019

    LinkedIn members entrust us with their personal data and we are committed to working hard every day to maintain that trust within a safe, professional environment. One crucial aspect to earn and maintain that trust lies in how well we secure our online systems and protect our data from unauthorized exposure. LinkedIn runs a microservice architecture, in which...

  • featuredimage7

    Defending Against Abuse at LinkedIn’s Scale

    December 6, 2018

    LinkedIn is committed to building a safe, trusted, and professional environment. Building the infrastructure to detect and mitigate abuse at LinkedIn’s scale brings with it a number of interesting challenges that require us to often think outside the box and craft new ways of integrating defenses throughout our product. In this post, we’ll provide a high-level...

  • fakeaccounts1

    Automated Fake Account Detection at LinkedIn

    September 12, 2018

    To maintain a safe and trusted professional community on LinkedIn, we require that every LinkedIn profile must uniquely represent a...

  • security-champions-1

    Scaling LinkedIn's Security Champions Program

    April 26, 2018

    Co-authors: Pavi Ramamurthy and Angel Liu   Three years ago, LinkedIn was looking to boost its internal security initiatives and...

  • phishing-1

    How LinkedIn is Working to Address Confusion Between Vendor...

    February 15, 2018

    Companies have been warning their employees about phishing and trying to train them to detect these attacks for the past decade. But...