Created Dec 2, 2020, Last active Mar 5, 2025
What is it? When considering the term “risk,” most people usually associate it with “What could go wrong?”. While generally true and rooted in evolutionary cognitive bias, this is only part of t...
...ur bug bounty program, but please note: automated scanner findings will not be accepted. Once submitted, you must first request permission from us before disclosing an issue publicly. Results o...
We maintain an always on bug bounty to identify and triage issues in our products and services. Many customers ask us for a copy of a recent ‘penetration reports’ or similar - basically a report from...
We recently published a blog on CASBs. We cover the basics of how CASBs enhance security for cloud apps and how the fit into the broader IT and security landscape, but there is so much more t...
In today's data-driven world, people are increasingly concerned about possible data breaches and the theft of important information. In order to protect its citizens, the EU Parliament adopted the&nb...
We’ve heard from many of you - our customers - that you want more details about how we manage your data in our cloud. In many cases, the customers I personally hear from want to make sure that their ...
We have re-certified for Payment Card Industries (PCI) for all of our major products. Specifically, we achieved certification for Jira, Confluence, Bitbucket and :LearnDot: as they use t...
...arget is missed, we help the team readjust. The most widely known example are S3 buckets that are publicly available and can be accessed by anyone. Countless companies have been caught off guard by a...
...f this issue. To address this, we wanted to find a single source of truth for public vulnerabilities that we could subscribe to. Our initial idea was to set up a Filter Subscription in JAC, however t...
Not only are new and emerging privacy regulations ambiguous, but they are also without precedent. Maintaining compliance can be incredibly challenging. That’s why we were excited to announce data r...
...ot public yet, but we will share the link when it is available. In her own words : "I’m so grateful for the opportunity to speak and share my philosophy on how to create an impactful r...
Recently we have seen huge growth in data encryption and related policies in industry. Two of the most important driving factor in this are, Cloud services GDPR and related compliance Encryption...
Why is it important to have a standard for evaluating cloud vendors? Having a standard, repeatable cloud vendor security evaluation checklist not only streamlines the process and makes it easier to...
I wanted to highlight two posts by @Karolina Lasoń [Deviniti] on Jira Service Desk permissions. In her two-part guide, she covers: How to configure project role, user group, and...
Reading the GDPR changes in Jira 7. There is a point mentioning that Some of the related entities will not work properly with inactive users and will need to be transferred to a differ...
Hello everyone, I wanted to share a blog that I recently wrote on ways to combat cloud security threats. Check it out and let me know what you think! How do you address cloud security threa...
Hello everyone! I've followed the changes and upcoming of Atlassian over the past 3 years. All the changes are super exciting. The business I work for is in the Medical Claims industry (one line of ...
My customers are worrying about sensitive data being emailed via comments. Are those details being sent encrypted as well? From Jira comments to user's email inbox?
...uilt new controls into your Atlassian account, so you can decide what personal information is visible across Atlassian cloud products and public communities, such as the Atlassian Community and the D...
We have invested heavily in making encryption available for our cloud products because we believe that it is a best practice for all cloud SaaS providers to offer this additional layer of protection ...
As your company adopts more and more SaaS tools to solve for specific business problems, new challenges arise. It is more difficult to keeping your company data secure across a growing number of...
We've often heard that customers need information about our cloud infrastructure as a part of their evaluation of our reliability and security. For this reason, I'm excited to share a behind-...
Encryption at rest is here! Following up on a previous product update we made, we are excited to announce that encryption at rest now applies to all existing and new Atlassian cloud sites,&nbs...
Frequently we are asked questions about how we manage vulnerabilities in our products as well as in our platform. We do maintain standard processes for what we do when we discover a vulnerability in ...
I just wanted to call your attention to a webinar that will be happening next week! Product Managers from the Google Cloud Identity and Atlassian Access teams will be discussing: The role...
The Trust & Security community group is Atlassian's go-to space for all things Security, Compliance, Privacy and more. This group is to share information, tips, and best practices for protecting your data and using Atlassian products in a secure and reliable way.
Copied to clipboard