...aoBao North Korean Bitcoin-Stealing Phishing Campaign This has all the markings of a phishing attack - has Atlassian suffered a security breach? "HaoBao" – North Korean Bitcoin-S...
Don't Miss This Webinar: How to Manage Jira Projects and Protect Your PM Data in 2025 Managing projects in Jira isn’t always straightforward, and let’s be honest—sometimes you’re not sure if y...
...nauthorized Access to Cloud-Based Resources Managing Security Reports Involving Trademark Abuse Procedure for Responding to Exposed Data or Services Management of Publicly Visible Security...
In today's digital landscape, ensuring the security of your systems and data is more critical than ever. Cyber threats are continuously evolving, and attackers are becoming increasingly s...
Is there any way to log when issues were deleted via bulk change and by which user? As far as I know, it is only logged when single issues are deleted via the GUI. Just another question: is there a...
Hi Trust and Security Community! I wanted to be sure you saw our most recent Ecosystem Quarterly Digest: 2024 Q4. This post gives a great overview of what we are doing to help d...
At Creativas, a Platinum Atlassian Marketplace Partner, we consider the security and satisfaction of our customers as a priority. It is at the core of everything we do. To a...
...onger a trend—it's necessary for businesses aiming to scale, collaborate, and innovate. Atlassian Cloud offers powerful tools like Jira, Confluence, and Bitbucket, built with robust security features....
...ranted. The result? Licenses remain unused, accumulating over time and unnecessarily inflating costs—money that could be saved or allocated elsewhere. The Hidden Risk: Unused Accounts Pose Security...
...ustomers, these reports can take the place of a penetration test report and show that we are actively testing and identifying any security issues that are in our products or services. As part of o...
...ssigned security for and should NOT be allowed to see. Why are search results shown to them that fall outside of this security? Can we disable the search bar? Are we not implementing something correctly t...
I have a private workspace. How can it be that someone requested to join? How is it that this is visible? What else can be seen? How can I know that none of the information was compromised? Thanks...
...ertain information isn’t shared beyond a specific, limited audience. That’s where issue security comes in - a platform feature designed to lock down issues to the right people. But this can be d...
...s a stark reminder of the fact. So, how can you protect your system from lurking cyber threats with ease? Fortunately, there’s a simple answer to this question, the miniOrange Enhanced API Security...
If you’re a Jira admin, you know managing data compliance is challenging. And here we are, wanting to help. This is why, from now on, you can use Data Residency in the My Requests Ext...
Our team is planning to develop a Jira plugin that will monitor billing payments from the bank side. We're aware that integrating financial data with Jira may have specific legal, security...
...rganizations working with sensitive information or adhering to strict security requirements, the full control over data offered by an on-premises or private cloud solution is essential. Customization a...
Hello Atlassian community, I am Nikhil, Product Manager for Audit Logs in Cloud. We are currently exploring how we can improve functionalities & retention period&nbs...
Hello Atlassian community, I am Nikhil, Product Manager for Audit Logs in Cloud. We are currently exploring how we can improve functionalities & retention period&nbs...
Hello Atlassian community, I am Nikhil, Product Manager for Audit Logs in Cloud. We are currently exploring how we can improve functionalities & retention period&nbs...
...ignificant challenges in complying with various regulations and their requirements. A MedTech Company must be compliant with their regional safety, performance and security regulations prior to p...
Hi, we noticed that when converting/moving issue types, applied restrictions for specific issues are removed. The issue then becomes visible for all users in the project. The restriction I...
Hi, Does anyone have experience of using Jira Cloud for Classified / Sensitive / Official Information such as work for the UK MOD? We'd like to replace our old Server instance but need assuran...
In today's ever-evolving & fast paced digital landscape, compliance is often perceived as a complex and burdensome requirement. Yet, emerging research underscores a transformative perspective: co...
Hello Community, Hope everyone is doing well. This week, I wanted to touch on the subject of Data Sovereignty and Compliance. I know a lot of us are heavily involved in the space, and others are af...
Copied to clipboard