Hello Community, is there a way to detect or recognize the export of a page or a space, so that an automation can be built on that trigger? As far as I know, there is no designed trigger in the aut...
In just 60 seconds, one phishing link click could jeopardize your entire system. Is your intranet secure enough to withstand the risks? It’s not just phishing that threatens intranet secur...
05/02/2024 Update: this feature is now generally available! Hello Trust & Security Community! We know Marketplace apps are a key part of your Atlassian solution, but depending on you...
G’day to our Enterprise community! As we get ready to wrap up 2023 , we compiled our annual highlights for all things Atlassian and our Cloud Enterprise Plan. We’d love to hear your commenta...
❓ Do you spend time trying to answer the question, what changed? Everything was working well yesterday! ❓Do you spend time copying workflows, screens and other configuration objects from your Jira ...
It‘s been six weeks and I‘m super-late to the party, but I refuse to accept that the party is already over. 😏 I‘m talking about Team ’23 of course. And if nothing else, I might at least have the...
Welcome to week three of Migrations Month! Hopefully, you’ve been able to join one (or all!) of our online activities this month. Earlier this month, our Chief Information Security Officer, Bala Sa...
Hello Atlassian community! My name is Sandy and I'm an Enterprise Trust product marketeer, focused on cloud security. We are excited to share that our upcoming webinar with Forrester, Boost data pr...
As technology advances, so does the need for protecting sensitive information. Data leaks can have devastating effects on companies and their clients. To better understand the impact of data leaks on...
Hello Atlassian community! My name is Nikhil and I'm a cloud security product manager. We are excited to announce the early access program (EAP) for data security policy capabilities...
Hello Atlassian community! My name is Nikhil and I'm a cloud security product manager. We are excited to announce the early access program (EAP) for data security policy capabilities...
...ersons in an emergency situation; Processing, to a reasonable extent, for actions of public interest; Processing, to a reasonable extent, under the PIPL, of personal information that has b...
...urposes the processing of personal data is carried out exclusively for the purpose of public and state security, national defense, or investigation and prosecution of crimes shared with B...
Today, increasingly demanding data privacy regulations are one of the most challenging issues facing companies. Violations of the protection of personally identifiable information (PII) result in sig...
Copied to clipboard
Online forums and learning are now in one easy-to-use experience.
By continuing, you accept the updated Community Terms of Use and acknowledge the Privacy Policy. Your public name, photo, and achievements may be publicly visible and available in search engines.