Jamf Blog

1965 more articles are waiting for you.

April 15, 2024 by Meghan Ruggio

Jamf + Rally makes it easy to Drop Everything and Read (DEAR).

Teachers can support daily DEAR time with just one click using the new Jamf and Rally integration.

April 12, 2024 by Ella Calatayud

JNUC 2024 Diversity Sponsorship

Join us for the Jamf Nation User Conference (JNUC) 2024, in Nashville, Tennessee, October 1- October 3. Jamf is offering JNUC sponsorships to 10 people from underrepresented groups within the technology sector.

April 12, 2024 by Michael Devins

Mitigate mercenary spyware attacks for iPhone with Jamf Executive Threat Protection

Explore a comprehensive mobile security strategy that defends against the most sophisticated attacks impacting users.

April 12, 2024 by Hannah Hamilton

What is threat detection?

Threats of all kinds put our cybersecurity in danger. Learn about common threat types and how to detect them.

April 10, 2024 by Sean Smith

Introducing Jamf Routines

Jamf Routines — widely announced at Jamf’s Spring Event — is now available to Jamf Business and Enterprise Plan customers. Read on to learn how Jamf Routines automates workflows, the templates that are available today and why we created it.

April 9, 2024 by Haddayr Copley-Woods

2024 Jamf Event: Education recap

The 2024 Jamf Event showed how to transform learning for students, teachers and parents; better protect students; and maintain seamless, secure access.

April 8, 2024 by Aaron Webb

Jamf Connect feature: Limit Application Access for Unmanaged Devices

Strengthening mobile security is critical. Especially for unmanaged devices that lack the management, identity and security controls of managed endpoints. In this blog, learn how Jamf Connect’s newest feature adds a layer of security to protect against unauthorized access and data breaches.

April 5, 2024 by Jamf Threat Labs

Infostealers continue to pose threat to macOS users

Jamf Threat Labs dissects ongoing infostealer attacks targeting macOS users. Each with different means of compromising the victim’s Macs but with similar aims: to steal sensitive user data.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.