Jamf Blog

1965 more articles are waiting for you.

June 29, 2018 by Joel Windels

How hackers are using phishing to bypass two-factor authentication

Two-factor authentication has been shown to prevent unauthorized users from accessing protected sites, services and data. But newer forms of attacks are seeing bad actors emulate 2FA sites to effectively sidestep the prompts and users are aiding them in compromising data by unknowingly handing them their credentials.

June 22, 2018 by Kat Garbis

The hows, whys and benefits of employee-choice programs

See how IBM paved the way for all organizations to offer their employees choice in work technology (and save substantial money in the process).

June 21, 2018 by Garrett Denney

Jamf Now update adds macOS restrictions, new Blueprints UI

Jamf Now has long supported a number of restrictions for enrolled and supervised devices. With this update, we’ve drastically increased what you can manage with restrictions. See what's available.

June 20, 2018 by James Felton

Defining the Jamf API options

Jamf is renaming two existing APIs: Classic API (formerly known as the Customer API) and Jamf Pro API (formerly known as the Universal API). See what they do and how they impact you.

June 18, 2018 by Brad Becker

An update on webhooks

We’re happy to report that over the past few releases of Jamf Pro, we’ve added many advanced features for webhooks. Read this for a summary of what's new.

June 15, 2018 by Charles Edge

Hey developers, join us for JNUC!

The Jamf Nation User Conference (JNUC) is rapidly approaching. Don't miss your opportunity to meet other developers and potential customers, present your solutions and/or even sponsor the conference.

June 14, 2018 by Brad Becker

7 tips and tricks for using the Classic API

The Classic API is a RESTful API and can be used to easily obtain information about devices and initiate actions within Jamf Pro. Here are seven cool ways to leverage the Classic API.

June 13, 2018 by Liarna La Porta

Call Me Maybe: iOS Suggested Contacts feature can be used to phish

Learn about how the iOS Suggested Contacts feature can serve as a vehicle for phishing attacks, and learn how to protect yourself.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.