{"id":12908,"date":"2025-11-13T09:31:35","date_gmt":"2025-11-13T09:31:35","guid":{"rendered":"https:\/\/www.salesforce.com\/?p=12908"},"modified":"2025-11-13T10:10:07","modified_gmt":"2025-11-13T10:10:07","slug":"smart-threats-navigating-the-ai-security-balance-in-salesforce","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/","title":{"rendered":"Smart Threats: Navigating the AI &amp; Security Balance in Salesforce"},"content":{"rendered":"\n<p>Artificial intelligence (AI) is changing how we work \u2014 and how attackers work, too.<br>The same tools that make our Salesforce teams smarter and faster can also create new risks if we\u2019re not paying attention. As administrators, you\u2019re on the front line of that shift, responsible for configuring, managing, and safeguarding the data that fuels your organisation\u2019s success.<\/p>\n\n\n\n<p>Let\u2019s explore how these new threats are emerging \u2014 and how Salesforce administrators can defend against them. Here\u2019s what every admin should know, and what you can do today to keep your org secure as AI-based threats continue to evolve.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-are-smart-threats\"><strong>What are \u201csmart threats\u201d?<\/strong><\/h3>\n\n\n\n<p>The term \u201csmart threats\u201d refers to familiar attack types like phishing, malware, and ransomware that are now being amplified by AI. Attackers are using AI to generate highly convincing messages, voices, and videos that make social engineering far more effective. From AI-generated vishing calls to deepfake impersonations, these methods are designed to trick users into handing over data or access they\u2019d normally protect.<\/p>\n\n\n\n<p>We\u2019re seeing attackers use AI to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Craft&nbsp;<strong>highly personalised phishing messages<\/strong>&nbsp;that sound natural and come from familiar looking senders.<\/li>\n\n\n\n<li>Generate&nbsp;<strong>deepfakes and voice clones<\/strong>&nbsp;to impersonate trusted individuals.<\/li>\n\n\n\n<li>Suggest or manipulate&nbsp;<strong>malicious code and configurations<\/strong>&nbsp;through AI coding tools.<\/li>\n<\/ul>\n\n\n\n<p>AI makes these attacks more believable and more scalable. But the good news is that we can use AI to counter them just as effectively.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-top-ai-driven-risks-for-admins\"><strong>The top AI-driven risks for admins<\/strong><\/h3>\n\n\n\n<p>Here are a few of the biggest risks AI introduces in a Salesforce environment, and why they matter to you.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>&nbsp;AI-generated phishing and impersonation<\/strong><\/li>\n<\/ol>\n\n\n\n<p>Attackers can use AI to write flawless phishing emails \u2014 even mimicking internal communications or Salesforce notifications. These are designed to trick users into sharing credentials or approving harmful actions.<\/p>\n\n\n\n<p><strong>What to do:<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reinforce security awareness and confirm that&nbsp;<strong>Multi-Factor Authentication (MFA)<\/strong>&nbsp;is&nbsp;<a href=\"https:\/\/security.salesforce.com\/mfa\" target=\"_blank\" rel=\"noreferrer noopener\">enabled for every login<\/a>. MFA remains one of the most effective controls we have.&nbsp;<\/li>\n\n\n\n<li>Regularly review permissions and apply the&nbsp;<a href=\"https:\/\/www.salesforce.com\/blog\/principle-of-least-privilege\/\">principle of least privilege<\/a>&nbsp;\u2014 give users only the access they need, for only as long as they need it. This limits the impact if credentials are ever compromised.<\/li>\n\n\n\n<li>Add access controls such as location or&nbsp;<a href=\"https:\/\/help.salesforce.com\/s\/articleView?language=en_US&amp;id=platform.login_ip_ranges.htm&amp;type=5\" target=\"_blank\" rel=\"noreferrer noopener\">IP-based restrictions<\/a>&nbsp;to limit where and when logins can occur. Restricting authentication to trusted networks or devices helps contain risk if a phishing attempt succeeds.<\/li>\n<\/ul>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>Unsafe use of AI tools<\/strong><\/li>\n<\/ol>\n\n\n\n<p>Experimenting with&nbsp;<a href=\"https:\/\/aws.amazon.com\/what-is\/large-language-model\/\" target=\"_blank\" rel=\"noreferrer noopener\">LLMs<\/a>&nbsp;can be exciting, but prompts that include customer data or personal information can unintentionally expose sensitive data outside your organisation.<\/p>\n\n\n\n<p><strong>What to do:<\/strong>&nbsp;Create clear internal guidelines for how AI tools can be used. Remind teams never to enter confidential or personally identifiable information into prompts.<\/p>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><strong>Excessive permissions and over-privileged accounts<\/strong><\/li>\n<\/ol>\n\n\n\n<p>Over time, users and integrations can accumulate access they no longer need. If any one of those credentials is phished or misused, broad permissions turn a small incident into a big one.<\/p>\n\n\n\n<p><strong>What to do:&nbsp;<\/strong>Apply the principle of least privilege. Keep the number of admins low, assign only the permissions required for a role, and remove access when it\u2019s no longer needed. Review permission sets, profiles, and connected app scopes regularly; prefer temporary or time-bound elevation over permanent broad access.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-recognising-and-preventing-user-targeted-attacks\"><strong>Recognising and preventing user-targeted attacks<\/strong><\/h3>\n\n\n\n<p>Technology changes quickly, but most attacks still target a person to gain access to an account or system \u2014 often a well-intentioned user making a quick decision. That\u2019s why your configuration choices as an admin matter so much.<\/p>\n\n\n\n<p>Salesforce gives you powerful tools to protect your data. Start by focusing on the essentials:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Security Health Check:<\/strong>&nbsp;Quickly identify and fix misconfigurations that create unnecessary risk.<\/li>\n\n\n\n<li><strong>Login IP Ranges:<\/strong>&nbsp;Control where users can access your org from.<strong>&nbsp;<\/strong><\/li>\n\n\n\n<li><strong>MFA:<\/strong>&nbsp;Block most access attempts by unauthorised users.<\/li>\n\n\n\n<li><strong>Shield<\/strong>&nbsp;provides deeper visibility into behaviour and data access patterns, helping you detect issues before they escalate.<\/li>\n<\/ul>\n\n\n\n<p>Small configuration decisions add up. They\u2019re what keep a simple click from turning into a security incident.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-ai-can-help-you-defend\"><strong>How AI can help you defend<\/strong><\/h3>\n\n\n\n<p>The same technology that powers these \u201csmart threats\u201d can also make your defenses smarter.<\/p>\n\n\n\n<p>At Salesforce, we\u2019ve built AI into our security tools in ways that help Admins identify, respond to, and even predict risk.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Trust Layer<\/strong>&nbsp;ensures generative AI features are designed with data isolation, zero data retention, and toxicity detection.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.salesforce.com\/blog\/agentforce-in-security-center\/\">Agentforce in Security Centre<\/a>&nbsp;uses analytics and anomaly detection to surface unusual activity across users and orgs.<\/li>\n<\/ul>\n\n\n\n<p>When used thoughtfully, AI can be one of your greatest allies in protecting data and strengthening trust.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-an-admin-action-plan\"><strong>An admin action plan<\/strong><\/h3>\n\n\n\n<p>If you\u2019re wondering where to start, here\u2019s a simple checklist to help you balance innovation and security in your org:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Review access and integrations.<\/strong>\n<ul class=\"wp-block-list\">\n<li>Audit API connections and connected apps, and remove any unnecessary integrations.<\/li>\n\n\n\n<li>Remove unnecessary permissions from user profiles, especially Admin-level permissions.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Revisit your MFA and session settings.<\/strong>\n<ul class=\"wp-block-list\">\n<li>Require MFA for every login, and enable session-based MFA for added security.<\/li>\n\n\n\n<li>Use Login IP Ranges to reduce exposure to unauthorised logins.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Leverage Security Centre and Shield products.<\/strong>\n<ul class=\"wp-block-list\">\n<li>Gain a unified view of your org\u2019s security posture.<\/li>\n\n\n\n<li>Get alerts when permissions or configurations change.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Educate your users.<\/strong>\n<ul class=\"wp-block-list\">\n<li>Run educational awareness sessions or phishing simulations to educate your users.<\/li>\n\n\n\n<li>Encourage a culture of reporting anything suspicious.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Stay informed.<\/strong>\n<ul class=\"wp-block-list\">\n<li>Follow the&nbsp;<a href=\"https:\/\/www.salesforce.com\/blog\/security\/\">Salesforce Blog\u2019s security hub<\/a>&nbsp;and&nbsp;<a href=\"http:\/\/security.salesforce.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">security.salesforce.com<\/a>&nbsp;for updates, best practices, and new tools.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-balancing-innovation-and-trust\"><strong>Balancing innovation and trust<\/strong><\/h3>\n\n\n\n<p>AI is transforming how we build, work, and protect. As Salesforce admins, you have a unique role in that transformation as both system owners and stewards of trust.<\/p>\n\n\n\n<p>The right security postures make innovation sustainable. When you configure with intention, monitor proactively, and use the tools available to you, you make your org and your company stronger.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-get-ahead-of-data-risks-with-a-salesforce-specific-data-loss-prevention-strategy\"><strong>Get ahead of data risks with a Salesforce-specific Data Loss Prevention strategy<\/strong><\/h2>\n\n\n\n<p>Explore the tools, best practices, and insights you need to secure your data \u2014 and your trust.\u00a0<a href=\"https:\/\/www.salesforce.com\/uk\/form\/platform\/data-loss-prevention-guide\/\" target=\"_blank\" rel=\"noreferrer noopener\">Download the complete guide<\/a>.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Artificial intelligence (AI) is changing how we work \u2014 and how attackers work, too.The same tools that make our Salesforce teams smarter and faster can also create new risks if we\u2019re not paying&hellip;<\/p>\n","protected":false},"author":288,"featured_media":12909,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sf_justforyou_enable_alt":true,"optimizely_content_id":"6905286c2c04a2b45cfa5fb4","post_meta_title":"","ai_synopsis":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"sf_topic":[72,251],"sf_content_type":[437],"coauthors":[541],"class_list":["post-12908","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","sf_topic-it","sf_topic-ai","sf_content_type-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Smart Threats: Navigating the AI &amp; Security Balance in Salesforce - Salesforce<\/title>\n<meta name=\"description\" content=\"Artificial intelligence (AI) is changing how we work \u2014 and how attackers work, too.The same tools that make our Salesforce teams smarter and faster can\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Smart Threats: Navigating the AI &amp; Security Balance in Salesforce\" \/>\n<meta property=\"og:description\" content=\"Artificial intelligence (AI) is changing how we work \u2014 and how attackers work, too.The same tools that make our Salesforce teams smarter and faster can\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-13T09:31:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-13T10:10:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2025\/11\/Shield.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Laura Pelkey\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Laura Pelkey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/\"},\"author\":[{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/image\/ab4ea38672f2e0081639a788cdd4d3ae\"}],\"headline\":\"Smart Threats: Navigating the AI &amp; Security Balance in Salesforce\",\"datePublished\":\"2025-11-13T09:31:35+00:00\",\"dateModified\":\"2025-11-13T10:10:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/\"},\"wordCount\":1021,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2025\/11\/Shield.webp\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/\",\"url\":\"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/\",\"name\":\"Smart Threats: Navigating the AI &amp; Security Balance in Salesforce - Salesforce\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2025\/11\/Shield.webp\",\"datePublished\":\"2025-11-13T09:31:35+00:00\",\"dateModified\":\"2025-11-13T10:10:07+00:00\",\"author\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/dcc5d72b477aa95a7ba34ba32516f89a\"},\"description\":\"Artificial intelligence (AI) is changing how we work \u2014 and how attackers work, too.The same tools that make our Salesforce teams smarter and faster can\",\"breadcrumb\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/#primaryimage\",\"url\":\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2025\/11\/Shield.webp\",\"contentUrl\":\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2025\/11\/Shield.webp\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.salesforce.com\/eu\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Smart Threats: Navigating the AI &amp; Security Balance in Salesforce\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/#website\",\"url\":\"https:\/\/www.salesforce.com\/eu\/blog\/\",\"name\":\"Salesforce\",\"description\":\"News, tips, and insights from the global cloud leader\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/eu\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/image\/ab4ea38672f2e0081639a788cdd4d3ae\",\"name\":\"Laura Pelkey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/image\/2fc3456589938b4b4494e56400b74d52\",\"url\":\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2025\/11\/laura-pelkey.webp?w=150&h=150&crop=1\",\"contentUrl\":\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2025\/11\/laura-pelkey.webp?w=150&h=150&crop=1\",\"width\":\"150\",\"height\":\"150\",\"caption\":\"Laura Pelkey\"},\"url\":\"https:\/\/www.salesforce.com\/eu\/blog\/author\/laura-pelkey\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Smart Threats: Navigating the AI &amp; Security Balance in Salesforce - Salesforce","description":"Artificial intelligence (AI) is changing how we work \u2014 and how attackers work, too.The same tools that make our Salesforce teams smarter and faster can","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/","og_locale":"en_GB","og_type":"article","og_title":"Smart Threats: Navigating the AI &amp; Security Balance in Salesforce","og_description":"Artificial intelligence (AI) is changing how we work \u2014 and how attackers work, too.The same tools that make our Salesforce teams smarter and faster can","og_url":"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/","og_site_name":"Salesforce","article_published_time":"2025-11-13T09:31:35+00:00","article_modified_time":"2025-11-13T10:10:07+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2025\/11\/Shield.webp","type":"image\/webp"}],"author":"Laura Pelkey","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Laura Pelkey","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/"},"author":[{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/image\/ab4ea38672f2e0081639a788cdd4d3ae"}],"headline":"Smart Threats: Navigating the AI &amp; Security Balance in Salesforce","datePublished":"2025-11-13T09:31:35+00:00","dateModified":"2025-11-13T10:10:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/"},"wordCount":1021,"commentCount":0,"image":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2025\/11\/Shield.webp","inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/","url":"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/","name":"Smart Threats: Navigating the AI &amp; Security Balance in Salesforce - Salesforce","isPartOf":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/#primaryimage"},"image":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2025\/11\/Shield.webp","datePublished":"2025-11-13T09:31:35+00:00","dateModified":"2025-11-13T10:10:07+00:00","author":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/dcc5d72b477aa95a7ba34ba32516f89a"},"description":"Artificial intelligence (AI) is changing how we work \u2014 and how attackers work, too.The same tools that make our Salesforce teams smarter and faster can","breadcrumb":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/#primaryimage","url":"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2025\/11\/Shield.webp","contentUrl":"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2025\/11\/Shield.webp","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.salesforce.com\/eu\/blog\/smart-threats-navigating-the-ai-security-balance-in-salesforce\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.salesforce.com\/eu\/blog\/"},{"@type":"ListItem","position":2,"name":"Smart Threats: Navigating the AI &amp; Security Balance in Salesforce"}]},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/eu\/blog\/#website","url":"https:\/\/www.salesforce.com\/eu\/blog\/","name":"Salesforce","description":"News, tips, and insights from the global cloud leader","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/eu\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/image\/ab4ea38672f2e0081639a788cdd4d3ae","name":"Laura Pelkey","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/image\/2fc3456589938b4b4494e56400b74d52","url":"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2025\/11\/laura-pelkey.webp?w=150&h=150&crop=1","contentUrl":"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2025\/11\/laura-pelkey.webp?w=150&h=150&crop=1","width":"150","height":"150","caption":"Laura Pelkey"},"url":"https:\/\/www.salesforce.com\/eu\/blog\/author\/laura-pelkey\/"}]}},"jetpack_featured_media_url":"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2025\/11\/Shield.webp","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/eu\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/posts\/12908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/users\/288"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/comments?post=12908"}],"version-history":[{"count":3,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/posts\/12908\/revisions"}],"predecessor-version":[{"id":12917,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/posts\/12908\/revisions\/12917"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/media\/12909"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/media?parent=12908"}],"wp:term":[{"taxonomy":"sf_topic","embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/sf_topic?post=12908"},{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/sf_content_type?post=12908"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/coauthors?post=12908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}