{"id":64404,"date":"2022-02-23T06:58:00","date_gmt":"2022-02-23T14:58:00","guid":{"rendered":"https:\/\/www.salesforce.com\/?p=64404"},"modified":"2022-02-23T06:58:00","modified_gmt":"2022-02-23T14:58:00","slug":"why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/","title":{"rendered":"Why Salesforce Paid Hackers $2.8M in 2021 to \u201cBreak Into\u201d Its Products"},"content":{"rendered":"\n<p><em>Salesforce\u2019s Bug Bounty program enlists ethical hackers to help keep customer data secure<\/em><\/p>\n\n\n\n<p>It may sound counterintuitive, but hackers actually help Salesforce keep customer data secure. In 2021 alone, Salesforce rewarded ethical hackers with over $2.8 million in \u201cbounties\u201d for helping to protect its systems.<\/p>\n\n\n\n<p>All Salesforce products are built with a security-first approach. Just like new vehicles undergo crash tests before going to market, Salesforce\u2019s security team ensures product and feature changes are rigorously evaluated before they are deployed. After all internal testing, Salesforce taps a trusted network of ethical hackers to kick the tires on its products through a \u201c<a href=\"https:\/\/bugbountycoi.org\/2021\/05\/04\/chapter-1-what-is-a-bug-bounty-program\/\" target=\"_blank\" rel=\"noreferrer noopener\">bug bounty program<\/a>\u201d that pays rewards, or bounties, for responsibly disclosing security issues. This security research takes place in non-production testing environments, known as a sandbox, that mirrors real user functionality to safely simulate attacks without potentially exposing actual customer data.&nbsp;<\/p>\n\n\n\n<p>Last year, ethical hackers submitted reports of more than 4.7K suspected vulnerabilities to Salesforce. Salesforce engineers assessed each report and resolved any valid security vulnerabilities, paying out bounties as high as $30,000 for some findings.<\/p>\n\n\n<div class=\"wp-block-image__wrapper\">\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"#\" class=\"wp-block-image__modal-toggle\" aria-expanded=\"false\" data-modal-id=\"54591-modal\"><span class=\"screen-reader-text\">Open Image Modal<\/span><img decoding=\"async\" src=\"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/37\/2022\/10\/BugBounty_img-4.jpg?w=1024\" alt=\"Bug Bounties\" class=\"wp-image-54591\"\/><\/a><\/figure><\/div>\n<div id=\"54591-modal\" class=\"image-modal\" aria-hidden=\"true\" aria-labelledby=\"image-dialog-title\"><div class=\"image-modal__overlay\" tabindex=\"-1\" data-a11y-dialog-hide><\/div><div class=\"image-modal__content\" role=\"dialog\"><button class=\"image-modal__close-button\" type=\"button\" data-a11y-dialog-hide aria-label=\"Close this image dialog window\"><svg viewBox=\"0 0 26 25\" height=\"16\" width=\"16\" fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><rect x=\".626\" y=\"22.753\" width=\"32\" height=\"3\" rx=\"1.5\" transform=\"rotate(-45 .626 22.753)\"\/><rect x=\"2.747\" y=\".125\" width=\"32\" height=\"3\" rx=\"1.5\" transform=\"rotate(45 2.747 .125)\"\/><\/svg><\/button><h1 id=\"image-dialog-title\" class=\"screen-reader-text\">Image Modal<\/h1>\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/37\/2022\/10\/BugBounty_img-4.jpg?w=1024\" alt=\"Bug Bounties\" class=\"wp-image-54591\"\/><\/figure><\/div>\n<\/div><\/div><\/div>\n\n\n<h2 class=\"wp-block-heading\">What is an ethical hacker?&nbsp;<\/h2>\n\n\n\n<p>Ethical hackers, also known as white-hat hackers or security researchers, use their extensive computer and programming knowledge for good. Unlike the hackers associated with phishing, ransomware, and other cyber attacks, ethical hackers are authorized to \u201cbreak into\u201d products and systems to uncover programming flaws or security concerns in exchange for payment. This allows engineers to apply fixes to protect end-users before any malicious hackers have a chance to exploit them.&nbsp;<\/p>\n\n\n\n<p>\u201cI was attracted to becoming an ethical hacker after starting my career as a developer,\u201d said Inhibitor181, an ethical hacker who participates in Salesforce\u2019s bug bounty program. \u201cNot only is it more stimulating and less monotonous to use my programming skills to legally hack into global companies\u2019 products, but it also allows me to do my part in preventing cybercrime. Not all hackers are bad.\u201d&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How does Salesforce\u2019s Bug Bounty Program work?&nbsp;<\/h2>\n\n\n\n<p>Salesforce was one of the first enterprise organizations to operate a bug bounty program. Since launching its program in 2015, Salesforce has awarded over $12.2 million in total bounties, including $9.5 million since 2019, and it continues to see investments in this cybersecurity measure pay dividends.&nbsp;<\/p>\n\n\n\n<p>In addition to the disclosure of more than 22.2K reports since its inception, the program has also helped Salesforce enhance its preventative security efforts from the inside out. For example, engineering teams use data from the bug bounty program to better understand the tendencies and methodologies of malicious hackers.<\/p>\n\n\n\n<p>\u201cBeing able to understand the methods the hackers use to find vulnerabilities allows me to employ the same methods to better secure our software,\u201d said Anup Ghatage, a Salesforce Software Engineer.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What\u2019s next for Salesforce\u2019s Bug Bounty Program?&nbsp;<\/h2>\n\n\n\n<p>Salesforce continuously evolves its bug bounty program, engaging with more ethical hackers to protect the company\u2019s growing product portfolio, continuing to facilitate hacker-powered testing of many products even earlier in their development cycles. As part of this initiative, in 2021, the company consistently ran targeted monthly promotions for the first time, offering multiplied bounties \u2013 in many cases, double or triple the standard reward \u2013 in exchange for verified reports on a specific Salesforce product. For example, the Trailhead Slack App served as a target for a bounty promotion in August, before its official release at Dreamforce in September.&nbsp;<\/p>\n\n\n\n<p>Salesforce is committed to advancing its bug bounty program and partnering with ethical hackers. The ability to find and fix vulnerabilities before products are rolled out to users is core to Salesforce\u2019s broader security initiatives and maintaining trust among its customers, partners, and entire ecosystem.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-explore-further\"><strong>Explore further<\/strong><\/h3>\n\n\n\n<p>To learn more about participation in Salesforce\u2019s invitation-only bug bounty program, contact security@salesforce.com.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Salesforce\u2019s Bug Bounty program enlists ethical hackers to help keep customer data secure It may sound counterintuitive, but hackers actually help Salesforce keep customer data secure. In 2021 alone, Salesforce rewarded ethical hackers with over $2.8 million in \u201cbounties\u201d for helping to protect its systems. All Salesforce products are built with a security-first approach. Just [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":64405,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"sf_subhead":"","sf_i18n_disclaimer":false,"_jetpack_memberships_contains_paid_content":false,"alternateThumbnailId":0,"sf_product_cta_id":0,"footnotes":""},"categories":[],"tags":[],"sf_content_type":[3994],"sf_theme":[3985],"sf_topic":[3986],"sf_product":[],"sf_industry":[],"sf_role":[],"sf_multimedia_asset":[],"sf_location":[3992],"sf_collection":[],"sf_visibility":[],"coauthors":[4159],"class_list":["post-64404","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","sf_content_type-snapshots","sf_theme-digital-transformation","sf_topic-digital-transformation","sf_location-amer"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why Salesforce Paid Hackers $2.8M in 2021 to \u201cBreak Into\u201d Its Products - Salesforce<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Salesforce Paid Hackers $2.8M in 2021 to \u201cBreak Into\u201d Its Products\" \/>\n<meta property=\"og:description\" content=\"Salesforce\u2019s Bug Bounty program enlists ethical hackers to help keep customer data secure It may sound counterintuitive, but hackers actually help Salesforce keep customer data secure. In 2021 alone, Salesforce rewarded ethical hackers with over $2.8 million in \u201cbounties\u201d for helping to protect its systems. All Salesforce products are built with a security-first approach. Just [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/salesforce\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-23T14:58:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2022\/10\/BugBountyProgram.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@salesforcenews\" \/>\n<meta name=\"twitter:site\" content=\"@salesforcenews\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lindsey Swartz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/\"},\"author\":[{\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/#\/schema\/person\/image\/7ccef9fdd5199fb38dd1a40907b22e51\"}],\"headline\":\"Why Salesforce Paid Hackers $2.8M in 2021 to \u201cBreak Into\u201d Its Products\",\"datePublished\":\"2022-02-23T14:58:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/\"},\"wordCount\":638,\"publisher\":{\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2022\/10\/BugBountyProgram.jpg\",\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/\",\"url\":\"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/\",\"name\":\"Why Salesforce Paid Hackers $2.8M in 2021 to \u201cBreak Into\u201d Its Products - Salesforce\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2022\/10\/BugBountyProgram.jpg\",\"datePublished\":\"2022-02-23T14:58:00+00:00\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/#primaryimage\",\"url\":\"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2022\/10\/BugBountyProgram.jpg\",\"contentUrl\":\"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2022\/10\/BugBountyProgram.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/#website\",\"url\":\"https:\/\/www.salesforce.com\/uk\/news\/\",\"name\":\"Salesforce\",\"description\":\"Get the latest Salesforce press releases, announcements, stories, and media contacts. See today\u2019s CRM news.\",\"publisher\":{\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/uk\/news\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/#organization\",\"name\":\"Salesforce\",\"url\":\"https:\/\/www.salesforce.com\/uk\/news\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Salesforce\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/salesforce\/\",\"https:\/\/x.com\/salesforcenews\",\"https:\/\/www.linkedin.com\/company\/salesforce\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/#\/schema\/person\/image\/7ccef9fdd5199fb38dd1a40907b22e51\",\"name\":\"Lindsey Swartz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g23494c9101089ad44ae88ce9d2f56aac\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"caption\":\"Lindsey Swartz\"},\"url\":\"https:\/\/www.salesforce.com\/uk\/news\/stories\/author\/lindseyswartz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why Salesforce Paid Hackers $2.8M in 2021 to \u201cBreak Into\u201d Its Products - Salesforce","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/","og_locale":"en_GB","og_type":"article","og_title":"Why Salesforce Paid Hackers $2.8M in 2021 to \u201cBreak Into\u201d Its Products","og_description":"Salesforce\u2019s Bug Bounty program enlists ethical hackers to help keep customer data secure It may sound counterintuitive, but hackers actually help Salesforce keep customer data secure. In 2021 alone, Salesforce rewarded ethical hackers with over $2.8 million in \u201cbounties\u201d for helping to protect its systems. All Salesforce products are built with a security-first approach. Just [&hellip;]","og_url":"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/","og_site_name":"Salesforce","article_publisher":"https:\/\/www.facebook.com\/salesforce\/","article_published_time":"2022-02-23T14:58:00+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2022\/10\/BugBountyProgram.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@salesforcenews","twitter_site":"@salesforcenews","twitter_misc":{"Written by":"Lindsey Swartz","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/"},"author":[{"@id":"https:\/\/www.salesforce.com\/uk\/news\/#\/schema\/person\/image\/7ccef9fdd5199fb38dd1a40907b22e51"}],"headline":"Why Salesforce Paid Hackers $2.8M in 2021 to \u201cBreak Into\u201d Its Products","datePublished":"2022-02-23T14:58:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/"},"wordCount":638,"publisher":{"@id":"https:\/\/www.salesforce.com\/uk\/news\/#organization"},"image":{"@id":"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2022\/10\/BugBountyProgram.jpg","inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/","url":"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/","name":"Why Salesforce Paid Hackers $2.8M in 2021 to \u201cBreak Into\u201d Its Products - Salesforce","isPartOf":{"@id":"https:\/\/www.salesforce.com\/uk\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/#primaryimage"},"image":{"@id":"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2022\/10\/BugBountyProgram.jpg","datePublished":"2022-02-23T14:58:00+00:00","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.salesforce.com\/uk\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/#primaryimage","url":"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2022\/10\/BugBountyProgram.jpg","contentUrl":"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2022\/10\/BugBountyProgram.jpg","width":1200,"height":675},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/uk\/news\/#website","url":"https:\/\/www.salesforce.com\/uk\/news\/","name":"Salesforce","description":"Get the latest Salesforce press releases, announcements, stories, and media contacts. See today\u2019s CRM news.","publisher":{"@id":"https:\/\/www.salesforce.com\/uk\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/uk\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.salesforce.com\/uk\/news\/#organization","name":"Salesforce","url":"https:\/\/www.salesforce.com\/uk\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.salesforce.com\/uk\/news\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Salesforce"},"image":{"@id":"https:\/\/www.salesforce.com\/uk\/news\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/salesforce\/","https:\/\/x.com\/salesforcenews","https:\/\/www.linkedin.com\/company\/salesforce\/"]},{"@type":"Person","@id":"https:\/\/www.salesforce.com\/uk\/news\/#\/schema\/person\/image\/7ccef9fdd5199fb38dd1a40907b22e51","name":"Lindsey Swartz","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g23494c9101089ad44ae88ce9d2f56aac","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"Lindsey Swartz"},"url":"https:\/\/www.salesforce.com\/uk\/news\/stories\/author\/lindseyswartz\/"}]}},"jetpack_featured_media_url":"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2022\/10\/BugBountyProgram.jpg","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/uk\/news","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/posts\/64404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/comments?post=64404"}],"version-history":[{"count":0,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/posts\/64404\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/media\/64405"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/media?parent=64404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/categories?post=64404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/tags?post=64404"},{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/sf_content_type?post=64404"},{"taxonomy":"sf_theme","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/sf_theme?post=64404"},{"taxonomy":"sf_topic","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/sf_topic?post=64404"},{"taxonomy":"sf_product","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/sf_product?post=64404"},{"taxonomy":"sf_industry","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/sf_industry?post=64404"},{"taxonomy":"sf_role","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/sf_role?post=64404"},{"taxonomy":"sf_multimedia_asset","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/sf_multimedia_asset?post=64404"},{"taxonomy":"sf_location","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/sf_location?post=64404"},{"taxonomy":"sf_collection","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/sf_collection?post=64404"},{"taxonomy":"sf_visibility","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/sf_visibility?post=64404"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/coauthors?post=64404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}