Hello, my dear community members! 🌟 How’s the excitement brewing for Team 24 in beautiful Barcelona? Only 5 days to go, and I’m buzzing with excitement! 🎉 As a showcase sponsor, it's a true honor...
Docker Hub had a security breach during which OAuth credentials "may" have been exposed, presumably for all Docker accounts. Their email mentions that they identified the issue on 2024.09.24, but t...
With every new evolution of technology, your organization needs another layer of security. However, with security comes governance which can be overwhelming for teams delivering projects. I...
Hello Jira Community! Remote work is here to stay. While this way of working offers incredible flexibility and opportunities, it also comes with its own set of headaches—especially when it comes to...
...rop by our booth to dive into our top-tier Atlassian security solutions, from our trusty Single Sign-On (SSO) and Multi-Factor Authentication (MFA) apps to our brand-new integrations. Plus, we’ll have s...
Hello Atlassian Community! I am Srivathsav from the Atlassian Marketplace Security team. I would like to make an announcement about Ecoscanner's new capabilities. Vulnerability scanning As a p...
What is CVSS and when to use it? The Common Vulnerability Scoring System (CVSS) is a standardized framework for rating the severity of security vulnerabilities. The CVSS was developed a...
...dition of the Ecosystem Trust Editorial, we’re excited to announce recent and upcoming releases that improve security, compliance, transparency, and efficiency for app developers, admins, and end users. R...
...evel improvements for Jira, including security and compliance enhancements, increased scalability, and new productivity capabilities for end-users. Platform releases drive significant value by a...
...ew permission schema and removed "all logged in users" from browse access. I have created a new Security Level. I attributed it to my issues as the default setting. Using t...
Hi everyone, We’re excited to share that soon, admins will be able to verify ownership of a domain using multiple methods (DNS, HTTPS, Google Workspace, and Microsoft Entra ID). By verif...
...anagement Why SHA-256 Checksum Verification matters and how does it enhance security? SHA-256 is a cryptographic hash function that produces a unique 256-bit (32-byte) signature for a text. When you d...
...RL2 went to IDP2 (e.g., Azure AD). This setup ensured a smooth user experience while maintaining security. So, that’s one of the business use cases! If you find this business challenge interesting or r...
Hi, I want to anonymize deleted/unlicensed users' names and surnames, how can I do it without deleting content they have made? Now when I delete/ suspend a user I can see the name with ...
...ustomers, these reports can take the place of a penetration test report and show that we are actively testing and identifying any security issues that are in our products or services. As part of our c...
...ustomers, these reports can take the place of a penetration test report and show that we are actively testing and identifying any security issues that are in our products or services. As part of our c...
The IT Security department at my company uses Rapid7's IVM platform for reporting on on-premise devices. We don't have a way of identifying which devices to assign for remediation. It w...
IT Security in my company focuses on specific CVEs to remediate. Is it possible to filter on these CVE Titles in Lacework so they could be linked to JIRA & have Issue/Tasks assigned to them?
...ulnerabilities in technical infrastructures caused by hardware or software failures. This regulation is designed to ensure the stability and security of Europe’s financial system in an increasingly d...
Hi folks, we wanted to help consolidate all the security content for the Data Center so that it can be easily accessible to customers in one central location. Because of this, we’re introducing the n...
When I click the Trello app tile from Atlassian's app switcher menu, the URL syntax appears as https://trello.com/appSwitcherLogin?login_hint=myEmail@example.com The screenshot below illustrates th...
...herefor being rejected based on our email security policies. How can I advise your customer on how to prevent this?
Hello Atlassian Community, Happy Thursday!😄 I’m thrilled to be here and share some key insights about enhancing API security with all of you. While browsing through the community, I’ve noticed m...
Hi DC Community, We are thrilled to introduce our latest product concept: Atlassian Guard Premium integration with Data Center. As you may already know, Atlassian unveiled our new security...
Hi everyone, my name is Holly Makris, and I’m a Principal Product Manager at Atlassian. We’re excited to release an update to the security guide in Atlassian Administration to help you s...
Copied to clipboard