Jamf Blog

2038 more articles are waiting for you.

August 8, 2024 by Jesus Vigo

What is Privilege Escalation?

Privilege Escalation enables unauthorized access to sensitive systems, placing confidential data at risk. Learn why organizations must mitigate this critical vulnerability and what strategies are effective in keeping endpoints protected.

August 6, 2024 by Jamf Threat Labs

Maintaining persistence through deception: The threat of fake iOS updates

Jamf Threat Labs explores how bad actors use fake iOS updates to maintain persistence on compromised devices.

August 5, 2024 by Jesus Vigo

Acceptable Use Policy for workplace technology

Organizations use Acceptable Use Policies (AUP) to set forth guidelines for employees and company practices. This aligns expectations for the use of computers and mobile devices with industry best practices, laws and regulatory compliance.

August 1, 2024 by Sean Smith

Managing data consumption in aviation

Find out how Jamf helps airlines manage their employees' data consumption — wherever they are located.

July 23, 2024 by Graham Pugh

Understanding Jamf Pro API Roles and Clients

Jamf Pro 10.49.0 introduced a more secure method of accessing the API: Client Credentials-based authentication. Here's how it works.

July 22, 2024 by Nadia Te

5 ways to empower learning with Cloudwork PlatformID and Jamf

As schools embrace cloud-based solutions and device management platforms, integrating Studentnet’s Cloudwork® PlatformID™ with Jamf Pro and Jamf Connect can create game-changing features.

July 19, 2024 by Hannah Hamilton

What is remote device management?

Learn what Remote Device Management (RDM) is and about RDM tools like mobile device management.

July 18, 2024 by Haddayr Copley-Woods

Navigating retail Apple deployments with Mobile Device Management

Retail device deployments can be complex. Here’s how to plan for the smoothest technology integration initiative possible.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.