{"version":"1.0","provider_name":"Salesforce","provider_url":"https:\/\/www.salesforce.com\/blog","author_name":"Nochum Klein","author_url":"https:\/\/www.salesforce.com\/blog\/author\/nochum-klein\/","title":"How Salesforce Creates Security Advocates","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"yxcA1pnYQx\"><a href=\"https:\/\/www.salesforce.com\/blog\/security-advocates\/\">How Salesforce Creates Security Advocates<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.salesforce.com\/blog\/security-advocates\/embed\/#?secret=yxcA1pnYQx\" width=\"600\" height=\"338\" title=\"&#8220;How Salesforce Creates Security Advocates&#8221; &#8212; Salesforce\" data-secret=\"yxcA1pnYQx\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/wp-bn.salesforce.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/wp-bn.salesforce.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/10\/Frame-1-38.png","thumbnail_width":1500,"thumbnail_height":844,"description":"While information security teams at every organization certainly do their best to secure the business, nothing is foolproof. Here's how Salesforce works to empower everyone \u2014 from customers to employees \u2014 to be a security advocate."}