This blog post was updated on June 15, 2017 Coauthor: Santosh Kumar Kancha There are any number of different factors that go into a decision about accepting a new job opportunity. What are the values of the company? Does the role fit my skillset? Is there growth trajectory? How long is my commute going to be? What are the benefits? Who would I be working with?...
Security Articles
-
- Topics:
- Product Design,
- Security
-
Editor's note: This blog has been updated. Introduction This summer I had the privilege of interning on LinkedIn’s House Security team. During this period I was tasked to analyze the details of a relatively new class of vulnerabilities, and create a BurpSuite extension that would help identifying problematic sites. In addition to open-sourcing the extension, we...
- Topics:
- Security
-
Today, we’re excited to share that Linkedin is open-sourcing our URL-Detector Java library. LinkedIn checks hundreds of thousands of URLs for malware and phishing every second. In order to guarantee that our members have a safe browsing experience, all user-generated content is checked by a backend service for potentially dangerous content. As a prerequisite for...
- Topics:
- Java,
- Open Source,
- Security
-
LinkedIn's infrastructure needs to seamlessly handle petabytes of data on a daily basis. Our data centers and infrastructure have...
- Topics:
- Altair,
- Falco,
- Security,
- data center,
- infrastructure
-
BGP, or the Border Gateway Protocol, is a widely-used protocol that allows very large networks, such as the Internet, to be able to...
- Topics:
- LinkedIn Tips,
- Security
-
BGP, or the Border Gateway Protocol, is a widely-used protocol that allows very large networks, such as the Internet, to be able to...
- Topics:
- Security