Co-authors: Sagar Shah and Jeff Bollinger The Moonshot LinkedIn connects and empowers more than 875 million members and over the past few years, has undergone tremendous growth. As an integral part of the Information Security organization at LinkedIn, the Threat Detection and Incident Response team (aka SEEK) defends LinkedIn against computer security threats....
Security Articles
-
Co-authors: Matthew Davidson, Walter Marchuk, Andreas Zaugg, Michael Garate, and William Buenzle In traditional network design, hardware firewalls are used to provide isolation of network segments. As a network increases in size and complexity, an increasing number of firewall rules are required to provide necessary access, but the number of rules a hardware...
- Topics:
- Security,
- trust engineering
-
LinkedIn is committed to providing a trusted environment to keep our nearly 740 million members safe. Part of that commitment involves protecting against various types of abuse on the platform. Fighting abuse presents many challenges; one example is when bad actors use bots for large-scale attacks, while another is when attack signals constantly evolve to adapt...
- Topics:
- trust engineering,
- Security
-
Co-authors: Sakshi Jain, Grace Tang, Gaurav Vashist, Yu Wang, John Lu, Ravish Chhabra, Shruti Sharma, Dana Tom, and Ranjeet Ranjan...
- Topics:
- trust engineering,
- Security
-
Co-authors: Cong Gu, Abin Shahab, Chen Qiang, and Keqiu Hu Editor's note: This blog has been updated. LinkedIn AI has been...
- Topics:
- Hadoop,
- Security,
- Open Source
-
Our members place their trust in us, and expect and deserve a safe and trusted community where they can express themselves...