Co-authors: Matthew Davidson, Walter Marchuk, Andreas Zaugg, Michael Garate, and William Buenzle In traditional network design, hardware firewalls are used to provide isolation of network segments. As a network increases in size and complexity, an increasing number of firewall rules are required to provide necessary access, but the number of rules a hardware...
Security Articles
-
- Topics:
- Security,
- trust engineering
-
LinkedIn is committed to providing a trusted environment to keep our nearly 740 million members safe. Part of that commitment involves protecting against various types of abuse on the platform. Fighting abuse presents many challenges; one example is when bad actors use bots for large-scale attacks, while another is when attack signals constantly evolve to adapt...
- Topics:
- trust engineering,
- Security
-
Co-authors: Sakshi Jain, Grace Tang, Gaurav Vashist, Yu Wang, John Lu, Ravish Chhabra, Shruti Sharma, Dana Tom, and Ranjeet Ranjan LinkedIn’s vision is to connect every member of the global workforce to economic opportunity. A key driver towards this vision is our world-class hiring marketplace, where we help job seekers find their next dream role and help...
- Topics:
- trust engineering,
- Security
-
Co-authors: Cong Gu, Abin Shahab, Chen Qiang, and Keqiu Hu Editor's note: This blog has been updated. LinkedIn AI has been...
- Topics:
- Hadoop,
- Security,
- Open Source
-
Our members place their trust in us, and expect and deserve a safe and trusted community where they can express themselves...
-
As the year draws to a close, we’re taking a look back at ten of our most popular 2019 articles on the LinkedIn Engineering Blog....
- Topics:
- artificial intelligence,
- Pinot,
- Feed Personalization ,
- Security,
- Kafka,
- SRE