At Refined, security has always been a top priority. We know that protecting your data is critical, and we take that responsibility seriously. That’s why we’re excited to share that we’ve achieved S...
We’re giving admins more control and teams more confidence when it comes to issue security Jira Admins no longer need to add themselves to every security level in order to configure issue security....
At Decadis, security and data protection have always been at the core of what we do. We are proud to announce that we have officially achieved ISO 27001:2022 certification, r...
...arketplace.atlassian.com/apps/1212681/secure-fields-data-security-privacy?hosting=datacenter&tab=overview Long story: When Does Password Sharing Become Necessary? Companies have various IT r...
With the rise of cyber threats, ensuring data protection and operational security is no longer optional—it's a fundamental requirement for business continuity and trust. Failing to meet industry-r...
In just 60 seconds, one phishing link click could jeopardize your entire system. Is your intranet secure enough to withstand the risks? It’s not just phishing that threatens intranet security...
...ustomers, these reports can take the place of a penetration test report and show that we are actively testing and identifying any security issues that are in our products or services. Our bug bounty p...
...anaging your company's data, and ensuring its security and automation has never been more important. However, managing data in Jira/Confluence could be challenging, while actively protecting critical c...
A quick story 👀 Meet Anna. She’s been using Jira for months, managing multiple projects and feeling confident about how things were running. She had tasks, deadlines, and her team’s progress all m...
...nterprise-level security by implementing the proper systems and processes to keep our customers' data safe. Gliffy has consistently been a leader in the Atlassian Marketplace when it comes to security...
Don't Miss This Webinar: How to Manage Jira Projects and Protect Your PM Data in 2025 Managing projects in Jira isn’t always straightforward, and let’s be honest—sometimes you’re not sure if y...
...nauthorized Access to Cloud-Based Resources Managing Security Reports Involving Trademark Abuse Procedure for Responding to Exposed Data or Services Management of Publicly Visible Security...
In today's digital landscape, ensuring the security of your systems and data is more critical than ever. Cyber threats are continuously evolving, and attackers are becoming increasingly s...
Hi Trust and Security Community! I wanted to be sure you saw our most recent Ecosystem Quarterly Digest: 2024 Q4. This post gives a great overview of what we are doing to help d...
At Creativas, a Platinum Atlassian Marketplace Partner, we consider the security and satisfaction of our customers as a priority. It is at the core of everything we do. To a...
...ustomers, these reports can take the place of a penetration test report and show that we are actively testing and identifying any security issues that are in our products or services. As part of o...
...ertain information isn’t shared beyond a specific, limited audience. That’s where issue security comes in - a platform feature designed to lock down issues to the right people. But this can be d...
If you’re a Jira admin, you know managing data compliance is challenging. And here we are, wanting to help. This is why, from now on, you can use Data Residency in the My Requests Ext...
...olour coding will help you to prioritise across all of the assessed vulnerabilities. NOTE: You can read more about assessing your security vulnerabilities using the CVSS in Jira in our earlier blog post....
With every new evolution of technology, your organization needs another layer of security. However, with security comes governance which can be overwhelming for teams delivering projects. I...
Hello Atlassian Community! I am Srivathsav from the Atlassian Marketplace Security team. I would like to make an announcement about Ecoscanner's new capabilities. Vulnerability scanning As a p...
What is CVSS and when to use it? The Common Vulnerability Scoring System (CVSS) is a standardized framework for rating the severity of security vulnerabilities. The CVSS was developed a...
...dition of the Ecosystem Trust Editorial, we’re excited to announce recent and upcoming releases that improve security, compliance, transparency, and efficiency for app developers, admins, and end users. R...
...evel improvements for Jira, including security and compliance enhancements, increased scalability, and new productivity capabilities for end-users. Platform releases drive significant value by a...
Hi everyone, We’re excited to share that soon, admins will be able to verify ownership of a domain using multiple methods (DNS, HTTPS, Google Workspace, and Microsoft Entra ID). By verif...
Copied to clipboard