{"id":70126,"date":"2024-04-09T06:00:00","date_gmt":"2024-04-09T13:00:00","guid":{"rendered":"https:\/\/www.salesforce.com\/?p=70126"},"modified":"2024-04-10T13:33:48","modified_gmt":"2024-04-10T12:33:48","slug":"how-to-develop-bug-bounty-programs","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/","title":{"rendered":"Salesforce Launches Playbook to Help Organizations Fortify Defenses Against New Cyber Risks"},"content":{"rendered":"\n<p>Salesforce today <a href=\"https:\/\/trailhead.salesforce.com\/content\/learn\/modules\/salesforce-bug-bounty-program\" target=\"_blank\" rel=\"noreferrer noopener\">released<\/a> new bug bounty learning content on <a href=\"https:\/\/trailhead.salesforce.com\/?tb_cmp=growth_paid_search&amp;gclid=Cj0KCQiAgK2qBhCHARIsAGACuzkNBs0bNzRlcM6ZB0-ld3AAiB5nWNyMiwFo5Mb43i3mjhVeRt3RCHUaAjRIEALw_wcB&amp;gclsrc=aw.ds\/?d=cta-body-promo-8&amp;_ga=2.85799262.611993133.1707757728-1048062803.1704906911\" target=\"_blank\" rel=\"noreferrer noopener\">Trailhead<\/a>, Salesforce\u2019s free online learning platform. This content provides the resources for any company to build their own bug bounty program as the cyber security landscape rapidly evolves.&nbsp;<\/p>\n\n\n\n<p><strong>Why it matters:<\/strong> <a href=\"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bug bounty programs<\/a>, which provide financial rewards to ethical hackers who discover software vulnerabilities, are an effective way for companies to gain insights into bad actors and stay ahead of evolving <a href=\"https:\/\/www.salesforce.com\/uk\/news\/stories\/ai-cyber-attack-prevention\/\" target=\"_blank\" rel=\"noreferrer noopener\">AI-powered security threats<\/a>.<\/p>\n\n\n\n<aside class=\"contextual-driver has-text-align-left contextual-driver--einstein\">\n\t<header class=\"tidbit-header\">\n\t\t<h2 class=\"tidbit-head\">\n\t\t\tBuild your own bug bounty program\t\t<\/h2>\n\t<\/header>\n\t<div class=\"tidbit-body\">\n\t\t<p><\/p>\t<\/div>\n\t\t\t<p class=\"tidbit-link label\">\n\t\t\t<a class=\"label has-right-arrow has-right-arrow--small\" href=\"https:\/\/trailhead.salesforce.com\/content\/learn\/modules\/salesforce-bug-bounty-program\" target=\"_blank\">\n\t\t\t\t<span>GET STARTED:<\/span>\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 14 10\">\n\t<path d=\"M13.92 5.38a1 1 0 000-.76.9.9 0 00-.17-.26.25.25 0 000-.07l-4-4a1 1 0 00-1.46 1.42L10.59 4H1.07a1 1 0 000 2h9.52l-2.3 2.29a1 1 0 000 1.42 1 1 0 001.42 0l4-4a.25.25 0 000-.07.9.9 0 00.21-.26z\" \/>\n<\/svg>\n\t\t\t<\/a>\n\t\t<\/p>\n\t\t\t\t<img class=\"tidbit img-einstein\"\n\t\tsrcset=\"\n\t\t\thttps:\/\/www.salesforce.com\/uk\/news\/wp-content\/themes\/newsroom\/assets\/images\/article-tidbit-einstein-large@0.5x.png 84w,\n\t\t\thttps:\/\/www.salesforce.com\/uk\/news\/wp-content\/themes\/newsroom\/assets\/images\/article-tidbit-einstein-large@1x.png 168w,\n\t\t\thttps:\/\/www.salesforce.com\/uk\/news\/wp-content\/themes\/newsroom\/assets\/images\/article-tidbit-einstein-large@2x.png 336w\n\t\t\"\n\t\tsrc=\"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/themes\/newsroom\/assets\/images\/article-tidbit-einstein-large@1x.png\"\n\t\talt=\"Illustration of einstein\"\n\t\tsizes=\"(min-width:1024px) 175px, 130px\"\n\t>\n\t<\/aside>\n\n\n\n\n<p><strong>Go deeper: <\/strong>The bug bounty series on Trailhead breaks down the process for developing programs into bite-sized learning, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Defining a program and its goals<\/li>\n\n\n\n<li>Structuring a bug bounty program, including typical work phases, areas of research outlined, and common personnel roles<\/li>\n\n\n\n<li>Getting to know the Salesforce bug bounty program<\/li>\n\n\n\n<li>Creating vulnerability reports&nbsp;<\/li>\n\n\n\n<li>Diving into targeted research campaigns<\/li>\n<\/ul>\n\n\n\n<p><strong>The bigger picture: <\/strong>From the volume of identified potential vulnerabilities to the firsthand intel on how hackers are using AI, bug bounty programs offer substantial ROI for organizations. Salesforce\u2019s program, for example, has <a href=\"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program\/\" target=\"_blank\" rel=\"noreferrer noopener\">awarded<\/a> over $18.9 million in bug bounties since 2015 to its ethical hackers, who have reported nearly 30,600 potential vulnerabilities.<\/p>\n\n\n\n<p><strong>Salesforce perspective: <\/strong>\u201cAs a trusted advisor to our customers, we share security tools and information they need to be successful. By providing the resources they need to establish their own bug bounty program and engage with ethical hackers, we are empowering companies to increase customer trust in the age of AI,\u201d said Brad Arkin, Chief Trust Officer.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>By providing the resources they need to establish their own bug bounty program and engage with ethical hackers, we are empowering companies to increase customer trust in the age of AI.<\/p>\n<cite>Brad Arkin, Chief Trust Officer, salesforce<\/cite><\/blockquote>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u201cWith the White House underscoring the importance of cybersecurity through the <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2023\/10\/30\/fact-sheet-president-biden-issues-executive-order-on-safe-secure-and-trustworthy-artificial-intelligence\/\" target=\"_blank\" rel=\"noreferrer noopener\">AI Executive Order<\/a> and securing <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2023\/09\/12\/fact-sheet-biden-harris-administration-secures-voluntary-commitments-from-eight-additional-artificial-intelligence-companies-to-manage-the-risks-posed-by-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">voluntary commitments<\/a> for advancing safe and trustworthy AI, and with hackers already using AI for cyberattacks, it\u2019s more urgent than ever for organizations to adopt measures to enhance the \u200b\u200bsecurity of their entire ecosystem,\u201d he continued.<\/li>\n<\/ul>\n\n\n\n<aside class=\"more-from-block more-from-block--2 alignfull wp-block-newsroom-moreontopic\">\n\t<div class=\"more-from-block__content\">\n\t\t\t\t\t<h4 class=\"more-from-block__title\">Related<\/h4>\n\t\t\n\t\t<div class=\"more-from-block__cards more-from-block__cards--2\"\n\t\t\t\t>\n\t\t\t\n\n<article\t\t\titemscope=\"\"\n\t\titemtype=\"https:\/\/schema.org\/Article\"\n\t\tdata-card-id=\"73710\"\n\t\tclass=\"content-card content-card--large-inline is-entire-area-clickable content-card--is-boxed\"\n\t\t\tdata-clickable-area-link=\"https:\/\/www.salesforce.com\/uk\/news\/stories\/agentic-enterprise-operating-system\/\"\n\t>\n\t\t\t<div class=\"content-card__image-container\" itemprop=\"image\" itemscope itemtype=\"https:\/\/schema.org\/ImageObject\">\n\t\t\t<img width=\"1024\" height=\"576\" src=\"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/04\/Australia.png?w=1024\" class=\"content-card__image\" alt=\"uki agentic enterprise\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/04\/Australia.png 1200w, https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/04\/Australia.png?w=300&amp;h=169 300w, https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/04\/Australia.png?w=768&amp;h=432 768w, https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/04\/Australia.png?w=1024&amp;h=576 1024w, https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/04\/Australia.png?w=264&amp;h=149 264w, https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/04\/Australia.png?w=500&amp;h=281 500w, https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/04\/Australia.png?w=678&amp;h=381 678w, https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/04\/Australia.png?w=150&amp;h=84 150w, https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/04\/Australia.png?w=314&amp;h=177 314w, https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/04\/Australia.png?w=343&amp;h=193 343w\" \/>\t\t\t\t\t<\/div>\n\t\n\t<div class=\"content-card__content-container content-card__content-container--style-\">\n\t\t\n\t\t\n\t\t\t\t\t<h3 itemprop=\"headline\" class=\"content-card__title\">\n\t\t\t\t\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"https:\/\/www.salesforce.com\/uk\/news\/stories\/agentic-enterprise-operating-system\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"_blank\"\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-card__title-link\"\n\t\t\t\t\t>\n\t\t\t\t\t\t\t\tWhy the agentic enterprise needs an operating system, not just a model\t\t\t\t<\/a>\t\t\t<\/h3>\n\t\t\n\t\t\t\t\n\t\t\n\t\t\t\t\t<div itemprop=\"readTime\" class=\"content-card__read-time\">\n\t\t\t\t4 min read\t\t\t<\/div>\n\t\t\n\t\t\t<\/div>\n\n<\/article>\n\n\n\n<article\t\t\titemscope=\"\"\n\t\titemtype=\"https:\/\/schema.org\/Article\"\n\t\tdata-card-id=\"73706\"\n\t\tclass=\"content-card content-card--large-inline is-entire-area-clickable content-card--is-boxed\"\n\t\t\tdata-clickable-area-link=\"https:\/\/www.salesforce.com\/uk\/news\/linked-content\/meet-the-new-slack\/\"\n\t>\n\t\t\t<div class=\"content-card__image-container\" itemprop=\"image\" itemscope itemtype=\"https:\/\/schema.org\/ImageObject\">\n\t\t\t<img width=\"1024\" height=\"576\" src=\"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/03\/LINKED-TILE_-Slackbot_-The-new-interface-for-work.png?w=1024\" class=\"content-card__image\" alt=\"View of Slackbot answering a request in Slack.\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/03\/LINKED-TILE_-Slackbot_-The-new-interface-for-work.png 1200w, https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/03\/LINKED-TILE_-Slackbot_-The-new-interface-for-work.png?w=300&amp;h=169 300w, https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/03\/LINKED-TILE_-Slackbot_-The-new-interface-for-work.png?w=768&amp;h=432 768w, https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/03\/LINKED-TILE_-Slackbot_-The-new-interface-for-work.png?w=1024&amp;h=576 1024w, https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/03\/LINKED-TILE_-Slackbot_-The-new-interface-for-work.png?w=264&amp;h=149 264w, https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/03\/LINKED-TILE_-Slackbot_-The-new-interface-for-work.png?w=500&amp;h=281 500w, https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/03\/LINKED-TILE_-Slackbot_-The-new-interface-for-work.png?w=678&amp;h=381 678w, https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/03\/LINKED-TILE_-Slackbot_-The-new-interface-for-work.png?w=150&amp;h=84 150w, https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/03\/LINKED-TILE_-Slackbot_-The-new-interface-for-work.png?w=314&amp;h=177 314w, https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2026\/03\/LINKED-TILE_-Slackbot_-The-new-interface-for-work.png?w=343&amp;h=193 343w\" \/>\t\t\t\t\t<\/div>\n\t\n\t<div class=\"content-card__content-container content-card__content-container--style-\">\n\t\t\n\t\t\n\t\t\t\t\t<h3 itemprop=\"headline\" class=\"content-card__title\">\n\t\t\t\t\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"https:\/\/www.salesforce.com\/uk\/news\/linked-content\/meet-the-new-slack\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"_blank\"\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-card__title-link\"\n\t\t\t\t\t>\n\t\t\t\t\t\t\t\tMeet the new Slack\t\t\t\t<\/a>\t\t\t<\/h3>\n\t\t\n\t\t\t\t\n\t\t\n\t\t\n\t\t\t<\/div>\n\n<\/article>\n\n\t\t<\/div>\n\t\t<noscript>\n<div class=\"pagination-fallback\">\n\n\t\t<a href=\"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/posts\/70126\/page\/2\/?bc=OTH#section-title\">\n\t\t\tOlder Posts\t\t<\/a>\n\t\t<\/div>\n<\/noscript>\n\t<\/div>\n<\/aside>\n\n\n\n<p><strong>The Trailblazer perspective:<\/strong> \u201cAs the cybersecurity landscape continues to evolve rapidly, Trailhead has been an incredible resource to continually learn new skills. Having a playbook to seamlessly set up a bug bounty program will unlock new capabilities and reshape how BACA Systems thinks about strengthening security practices,\u201d said Andrew Russo, Salesforce Architect, BACA Systems.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-learn-more\"><strong>Learn more<\/strong>:<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Get started with building a <a href=\"https:\/\/trailhead.salesforce.com\/content\/learn\/modules\/salesforce-bug-bounty-program\" target=\"_blank\" rel=\"noreferrer noopener\">bug bounty program<\/a><\/li>\n\n\n\n<li>Learn more about Salesforce\u2019s <a href=\"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bug Bounty Program<\/a><\/li>\n\n\n\n<li>Read more about why one of Salesforce\u2019s top ethical hackers <a href=\"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program\/\" target=\"_blank\" rel=\"noreferrer noopener\">hacks for good<\/a><\/li>\n\n\n\n<li>Explore Salesforce\u2019s cybersecurity tips and resources <a href=\"https:\/\/security.salesforce.com\/cybersecurity-awareness-month\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Salesforce today released new bug bounty learning content on Trailhead, Salesforce\u2019s free online learning platform. This content provides the resources for any company to build their own bug bounty program as the cyber security landscape rapidly evolves.&nbsp; Why it matters: Bug bounty programs, which provide financial rewards to ethical hackers who discover software vulnerabilities, are [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":70125,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"sf_subhead":"","sf_i18n_disclaimer":false,"_jetpack_memberships_contains_paid_content":false,"alternateThumbnailId":0,"sf_product_cta_id":0,"footnotes":""},"categories":[],"tags":[],"sf_content_type":[4142],"sf_theme":[3985],"sf_topic":[3978,3986,4069],"sf_product":[4023],"sf_industry":[],"sf_role":[],"sf_multimedia_asset":[],"sf_location":[4301],"sf_collection":[],"sf_visibility":[],"coauthors":[],"class_list":["post-70126","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","sf_content_type-news-highlights","sf_theme-digital-transformation","sf_topic-artificial-intelligence","sf_topic-digital-transformation","sf_topic-trust","sf_product-trailhead","sf_location-global"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Salesforce Launches Playbook to Help Organizations Fortify Defenses Against New Cyber Risks - Salesforce<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Salesforce Launches Playbook to Help Organizations Fortify Defenses Against New Cyber Risks\" \/>\n<meta property=\"og:description\" content=\"Salesforce today released new bug bounty learning content on Trailhead, Salesforce\u2019s free online learning platform. This content provides the resources for any company to build their own bug bounty program as the cyber security landscape rapidly evolves.&nbsp; Why it matters: Bug bounty programs, which provide financial rewards to ethical hackers who discover software vulnerabilities, are [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/salesforce\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-09T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-10T12:33:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2024\/04\/CyberRisks_Playbook_Trailhead.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@salesforcenews\" \/>\n<meta name=\"twitter:site\" content=\"@salesforcenews\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Salesforce Launches Playbook to Help Organizations Fortify Defenses Against New Cyber Risks\",\"datePublished\":\"2024-04-09T13:00:00+00:00\",\"dateModified\":\"2024-04-10T12:33:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/\"},\"wordCount\":439,\"publisher\":{\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2024\/04\/CyberRisks_Playbook_Trailhead.jpg\",\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/\",\"url\":\"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/\",\"name\":\"Salesforce Launches Playbook to Help Organizations Fortify Defenses Against New Cyber Risks - Salesforce\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2024\/04\/CyberRisks_Playbook_Trailhead.jpg\",\"datePublished\":\"2024-04-09T13:00:00+00:00\",\"dateModified\":\"2024-04-10T12:33:48+00:00\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/#primaryimage\",\"url\":\"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2024\/04\/CyberRisks_Playbook_Trailhead.jpg\",\"contentUrl\":\"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2024\/04\/CyberRisks_Playbook_Trailhead.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/#website\",\"url\":\"https:\/\/www.salesforce.com\/uk\/news\/\",\"name\":\"Salesforce\",\"description\":\"Get the latest Salesforce press releases, announcements, stories, and media contacts. See today\u2019s CRM news.\",\"publisher\":{\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/uk\/news\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/#organization\",\"name\":\"Salesforce\",\"url\":\"https:\/\/www.salesforce.com\/uk\/news\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Salesforce\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/uk\/news\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/salesforce\/\",\"https:\/\/x.com\/salesforcenews\",\"https:\/\/www.linkedin.com\/company\/salesforce\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Salesforce Launches Playbook to Help Organizations Fortify Defenses Against New Cyber Risks - Salesforce","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/","og_locale":"en_GB","og_type":"article","og_title":"Salesforce Launches Playbook to Help Organizations Fortify Defenses Against New Cyber Risks","og_description":"Salesforce today released new bug bounty learning content on Trailhead, Salesforce\u2019s free online learning platform. This content provides the resources for any company to build their own bug bounty program as the cyber security landscape rapidly evolves.&nbsp; Why it matters: Bug bounty programs, which provide financial rewards to ethical hackers who discover software vulnerabilities, are [&hellip;]","og_url":"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/","og_site_name":"Salesforce","article_publisher":"https:\/\/www.facebook.com\/salesforce\/","article_published_time":"2024-04-09T13:00:00+00:00","article_modified_time":"2024-04-10T12:33:48+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2024\/04\/CyberRisks_Playbook_Trailhead.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@salesforcenews","twitter_site":"@salesforcenews","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/"},"author":{"name":"","@id":""},"headline":"Salesforce Launches Playbook to Help Organizations Fortify Defenses Against New Cyber Risks","datePublished":"2024-04-09T13:00:00+00:00","dateModified":"2024-04-10T12:33:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/"},"wordCount":439,"publisher":{"@id":"https:\/\/www.salesforce.com\/uk\/news\/#organization"},"image":{"@id":"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2024\/04\/CyberRisks_Playbook_Trailhead.jpg","inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/","url":"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/","name":"Salesforce Launches Playbook to Help Organizations Fortify Defenses Against New Cyber Risks - Salesforce","isPartOf":{"@id":"https:\/\/www.salesforce.com\/uk\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/#primaryimage"},"image":{"@id":"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2024\/04\/CyberRisks_Playbook_Trailhead.jpg","datePublished":"2024-04-09T13:00:00+00:00","dateModified":"2024-04-10T12:33:48+00:00","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.salesforce.com\/uk\/news\/stories\/how-to-develop-bug-bounty-programs\/#primaryimage","url":"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2024\/04\/CyberRisks_Playbook_Trailhead.jpg","contentUrl":"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2024\/04\/CyberRisks_Playbook_Trailhead.jpg","width":1200,"height":675},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/uk\/news\/#website","url":"https:\/\/www.salesforce.com\/uk\/news\/","name":"Salesforce","description":"Get the latest Salesforce press releases, announcements, stories, and media contacts. See today\u2019s CRM news.","publisher":{"@id":"https:\/\/www.salesforce.com\/uk\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/uk\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.salesforce.com\/uk\/news\/#organization","name":"Salesforce","url":"https:\/\/www.salesforce.com\/uk\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.salesforce.com\/uk\/news\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Salesforce"},"image":{"@id":"https:\/\/www.salesforce.com\/uk\/news\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/salesforce\/","https:\/\/x.com\/salesforcenews","https:\/\/www.linkedin.com\/company\/salesforce\/"]}]}},"jetpack_featured_media_url":"https:\/\/www.salesforce.com\/uk\/news\/wp-content\/uploads\/sites\/5\/2024\/04\/CyberRisks_Playbook_Trailhead.jpg","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/uk\/news","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/posts\/70126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/comments?post=70126"}],"version-history":[{"count":2,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/posts\/70126\/revisions"}],"predecessor-version":[{"id":70130,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/posts\/70126\/revisions\/70130"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/media\/70125"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/media?parent=70126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/categories?post=70126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/tags?post=70126"},{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/sf_content_type?post=70126"},{"taxonomy":"sf_theme","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/sf_theme?post=70126"},{"taxonomy":"sf_topic","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/sf_topic?post=70126"},{"taxonomy":"sf_product","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/sf_product?post=70126"},{"taxonomy":"sf_industry","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/sf_industry?post=70126"},{"taxonomy":"sf_role","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/sf_role?post=70126"},{"taxonomy":"sf_multimedia_asset","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/sf_multimedia_asset?post=70126"},{"taxonomy":"sf_location","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/sf_location?post=70126"},{"taxonomy":"sf_collection","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/sf_collection?post=70126"},{"taxonomy":"sf_visibility","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/sf_visibility?post=70126"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/uk\/news\/wp-json\/wp\/v2\/coauthors?post=70126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}