I received an email this afternoon telling me Thank You for getting Loom. Until that moment, I had never heard of Loom. I Googled it and that led me to Atlassian. I want this account closed and delet...
Hi, Is there a way to prevent a user with access to an Object Schema from being able to export the data? We are integrating Assets functionality to enrich our JSM Issues with additional information...
Hi everyone, I’m trying to configure Issue Security Levels in Jira Cliud and would appreciate your advice. My goal is to achieve the following setup: The Epic and all its child issues (Tasks/S...
Hi everyone, I am the Administrator for our Atlassian Cloud site (Jira/Confluence), and I am currently locked out of the admin console. The Problem: Our company's email domain has expired and is n...
...bsp;This becomes a major security concern when Crowd is used to authenticate users into critical non-Atlassian applications. This article explains how organizations can enforce application-s...
...ill communicate specific changes, release plans, and upgrade guidance. Scope at a glance Stronger security by design The upcoming changes share a united goal: meet and maintain a strong security...
...howing that we are actively testing and identifying security issues that are in our products or services. Our bug bounty program serves as an extension of our own team, providing continuous monitoring a...
I'm wanting to be able to put the github repository (Security Container) into the Ticket title, and to label & route tickets accordingly based on the github repository that they came from. I'm n...
...dited or deleted comments are retained in the change history As long as personal data is stored and is accessible, it could still be relevant for: GDPR audits security investigations c...
...o meet the requirements of highly regulated customers in our cloud offering. Many of you in the Australian public sector may be wondering what happens next as the Australian Government Information Security...
...ard numbers Personal information (e.g., emails, phone numbers, addresses) Social Security Numbers or national IDs OAuth tokens and secrets The tricky part? This data is often temporary, e...
...hat help you reduce risk while staying efficient. We rolled out more granular controls for data security policies and content redaction to help you stay ahead of threats, along with new automation o...
🔐 Ready to learn more about enhancing security for your team? Guard in Action is a free, virtual event ideal for admins, IT security professionals, and anyone interested in learning more a...
...or many enterprise teams, the real question is not whether to use AI, but how to use it—and how AI adoption affects data security. This concern becomes especially important when Jira data is involved....
TL;DR In regulated industries like finance, Jira lacks built-in, fine-grained control over who can view or edit sensitive custom field data (e.g., salaries, budgets). This cr...
Hello folks, In the last article, we explored how the Multi-IdP Support of miniOrange SAML SSO + User & Group Sync (SCIM) gives teams the flexibility to authenticate users...
AIMS and why we should care AI is dominating the conversation when it comes to the ways we live our lives inside and outside of work. That’s the obvious backdrop to ISO/IEC 42001, the new standard p...
...loud, but you cannot compromise on security or compliance. Atlassian has bridged this gap with the Atlassian Government Cloud (AGC), a platform designed to meet teams where they are - securely. You c...
Hello Atlassian Community! 👋 I'm back again with another use case story, Episode 6 already! In this series, I try to share interesting real-world scenarios we’ve come across around security a...
Hello folks, In the last article, we explored Hardware Tokens like YubiKey - a hardware-based authentication method available in miniOrange 2FA that adds a strong physical layer of security...
Hi everyone, I’m a VP of Data & Analytics at a regulated bank. We are currently scrambling to prepare our DORA Article 28 Register of Information (RoI) for the upcoming 2026 reporting cycle. I ...
...ainless - old and new systems can run in parallel. 🛡️ Strong, Consistent Security - Regardless of the IdP, your Atlassian SSO follows the same secure SAML flow - with signed requests, e...
...ccounts. Today, we’re diving into a method trusted by security-first teams around the world - Hardware Tokens, especially YubiKey 🔐 They add a physical layer of security you can hold, tap, and t...
...ontrol and MFA enforcement ✅ Compliance-ready (DORA, HIPAA, NIS2, etc.) ✅ No more password fatigue When to use SAML: You want to simplify login and remove passwords You need strong security...
...erving external customers, vendors, partners, or clients, this transition brings unique challenges not just in data migration, but in preserving the security and access controls that have been built over t...
Copied to clipboard