Created Dec 2, 2020, Last active today
Hi all, I have a - in my view - somewhat delicate problem and I am not entirely sure where to raise it. I used to work in a company that used Atlassian apps (let's call it @lastjob.com) until ...
Atlassian just updated our cloud architecture diagram to better address some of the questions our customers have. Atlassian Cloud Architecture Diagram
...itbucket repository is private, users can still visit and view the static website. The same is true if the underlying repository is public. Mitigation Atlassian has added bitbucket.io to t...
With the end-of-life approaching for Confluence and Jira server products, we are looking at the cloud offerings from Atlassian. We really enjoying using the products, but only have a small lice...
...aking two of its Bug Bounty Programs public! The Atlassian Marketplace Vulnerability Disclosure Program and the Atlassian Ecosystem Program will now accept submissions from all Bugcrowd researchers, as o...
Check out how Atlassian approachs the software development lifecycle (SDLC.)
TL/DR: The Atlassian Trust Center has new and improved Atlassian Compliance Resource Center! The Atlassian Trust, Security and Engagement team are proud to ship our latest project - the New Atl...
Hi everyone! We recently released several new features to Atlassian Access we're excited to share with you! Tune in to this on-demand webinar as we cover: Administrative flexibility with a...
On July 2, IT management software vendor Kaseya disclosed an active attack on a small number of customers of their Kaseya VSA product (Kaseya Security Advisory). The US-CERT reported this as a ...
We maintain an always on bug bounty to identify and triage issues in our products and services. Many customers ask us for ‘penetration reports’ or similar - basically a report from a third-party that...
Scenario here is, when calling some third party API you get ID of items from third party, should we use that id as identifier in our system. I need some pros and cons of this.
Just wanted to make a quick intro - I am a new Product Manager @ Actonic, I am very excited and honored to be a part of this important mission of increasing protection of Private data and providing t...
...ata Center). The first vulnerability, known as session fixation, affected four public-facing applications run by Atlassian for customer and partner support (jira.atlassian.com, confluence.atlassian...
Hi one and all 👋 This July, AC and Atlassian have teamed up to host Your Journey with the Atlassian Cloud 2021! The global event is free for all and provides two tracks from vendors and cloud spec...
Hi all, learn about the current state of data privacy in the Atlassian ecosystem with us. What can you do to deal with personal data that is actually present in your active instance already? We show...
Hi everyone! I'm back again to share with you one of the concepts the design team has been working on. This is all about how we can give you more control over your apps when in cloud, so that we ca...
TL,DR: The Call for Speakers for Team Sec Con 2021 is now open! This conference is focused on cloud security, getting started in the cloud security space, and cloud migration...
Hi everyone! Atlassian Product Security Team would like to share about a ritual that we practice called “Innovation Week.” Last year, during the shift to work-from-home for everyone on the team, we c...
Atlassian primarily relies on our Atlassian Bug Bounty Program and our own internal testing by our Security Engineers to test and identify security issues or vulnerabilities in our Products and Servi...
Hi, Is there a way to set up password expiration policy such as 90 days expiration for portal users in Jira Service Management?
Hi everyone! I'm a researcher in the Atlassian ecosystem and marketplace. That means that I work with third-party apps and customizations you build in-house. We are currently investigatin...
...anagement. We engage with BugCrowd to maintain a Bug Bounty program, to conduct ongoing vulnerability assessment of our publicly available Applications and Services, the program is available at : h...
Hi Everyone! As we work to roll out Data Residency for Standard and Premium, we're taking a second look at two terms that we've been using: - Regions: most closely related to an AWS Region - Re...
Hi all! I'm PMM on the Enterprise team at Atlassian and I'm here to share some info about an upcoming webinar that may be interesting to this group. On May 19th/20th, we'll be hosting a webin...
On April 15th, Codecov disclosed that “someone had gained unauthorized access to their Bash Uploader script and modified without their permission”. Atlassian immediately began investigating the inc...
The Trust & Security community group is Atlassian's go-to space for all things Security, Compliance, Privacy and more. This group is to share information, tips, and best practices for protecting your data and using Atlassian products in a secure and reliable way.
Copied to clipboard