![Illustration of person on computer / How to Manage Customer Preferences in Salesforce Platform and Salesforce Privacy Center](https://www.salesforce.com/blog/wp-content/uploads/sites/2/2023/07/Frame-1-9.png?w=889)
Customer Preferences in Salesforce Platform and Salesforce Privacy Center
Salesforce provides a number of tools within the platform to help you stay compliant and meet your customers’ needs around preference management.
![vector of a magnifying glass and people team working conducting vulnerability scan analysis / A Go-To Guide for Identifying and Prioritizing Vulnerabilities](https://www.salesforce.com/blog/wp-content/uploads/sites/2/2023/06/Frame-1-26.png?w=889)
A Go-To Guide for Identifying and Prioritizing Vulnerabilities
Once you identify what vulnerabilities are present in your environment, you’ll be able to reduce your company’s risk profile.
![Image of woman studying in a classroom setting / Cybersecurity Learning Hub: Addressing the Global Workforce Gap Through Education](https://www.salesforce.com/blog/wp-content/uploads/sites/2/2023/05/Frame-1-37.png?w=889)
Cybersecurity Learning Hub: Addressing the Global Workforce Gap Through Education
The Cybersecurity Learning Hub addresses the security workforce shortage and empowers everyone with accessible content focused on developing practical and applicable skills.
![Image of woman on laptop // Protecting Data with the Principle of Least Privilege](https://www.salesforce.com/blog/wp-content/uploads/sites/2/2023/05/Frame-1-22.png?w=889)
Protecting Data with the Principle of Least Privilege
Traditional network security is no longer a viable solution to stay ahead of today's threats. Implementing the principle of least privilege can help protect your valuable data.
![Image of person on laptop and selecting documents / Salesforce is now part of the HITRUST Shared Responsibility and Inheritance program](https://www.salesforce.com/blog/wp-content/uploads/sites/2/2023/04/Frame-1-6.png?w=889)
Salesforce is Now Part of the HITRUST Shared Responsibility and Inheritance Program
Governments across the globe are instituting regulatory requirements that, while critical to protecting data privacy, can create costly and time-consuming challenges.
![Image of a dashboard // Seeing is Believing: Data Management and Visualization for Large Scale Security Programs](https://www.salesforce.com/blog/wp-content/uploads/sites/2/2022/12/Frame-1-16.png?w=889)
Seeing is Believing: Data Management and Visualization for Large Scale Security Programs
Learn how Salesforce Security uses analytics to manage a large-scale program.
![image of connected people and world / Managing Upgrades in Today’s Changing Landscape - Why Hyperforce?](https://www.salesforce.com/blog/wp-content/uploads/sites/2/2022/12/Frame-1-33.png?w=889)
Managing Upgrades in Today’s Changing Landscape — Why Hyperforce?
Learn about the benefits of this cloud-native architecture, the upgrade process, and the security it brings to your business.
![Image of lady on computer // What is a GovCloud?](https://www.salesforce.com/blog/wp-content/uploads/sites/2/2022/12/Frame-1-19.png?w=889)
What is a GovCloud?
Learn how Salesforce Government Cloud Plus helps public sector agencies and contractors access industry-leading solutions to achieve mission success and digital transformation across the industry.
![Illustration of detection alert of logs / Is OCSF the Key to Democratizing Security Data Lakes?](https://www.salesforce.com/blog/wp-content/uploads/sites/2/2022/12/Frame-1-32.png?w=889)
Is OCSF the Key to Democratizing Security Data Lakes?
Ingesting and analyzing security data takes a lot of time and resources, but the Open Cybersecurity Schema Framework (OCSF) aims to change that.
![image of security log dashboard with magnifying glass over it / Exploring Amazon Security Lake](https://www.salesforce.com/blog/wp-content/uploads/sites/2/2022/11/Frame-1-30.png?w=889)
Exploring Amazon Security Lake
Salesforce's Detection and Response team had the opportunity to experiment with the new Amazon Security Lake.