Jamf Blog

1984 more articles are waiting for you.

February 17, 2023 by Jonathan Locast

Jamf Safe Internet protects everywhere that students learn

Jamf Safe Internet, offering comprehensive content-filtering technology and endpoint protection for students, was launched last year. Here’s a bit more about how our school internet filtering works — and why school web filters are important.

February 17, 2023 by Jamf Threat Labs

Jamf Threat Labs analyzes the exploited in-the-wild WebKit vulnerability CVE-2022-42856

Jamf Threat Labs investigated a WebKit vulnerability that was exploited in the wild. Attackers can exploit CVE-2022-42856 to control code execution within WebKit, giving them the ability to read/write files. This blog explores what the vulnerability looked like in the code and the patches Apple applied.

February 16, 2023 by Hannah Hamilton

Top security priorities: identity and access controls

Identity and access controls are key to keeping access to your company resources in the hands of authorized users. This next blog in the Top Security Priorities series will discuss a few access control practices for your organization to implement.

February 15, 2023 by Haddayr Copley-Woods

Misconceptions about mobile BYOD

Worried about what Bring Your Own Device (BYOD) might mean for your organization . . . or yourself? Read on to see us debunk some common myths about BYOD.

February 15, 2023 by Laurie Mona

Jamf Breakfast Club: Choosing the right tech tools for the modern classroom

In the February EMEIA Jamf Breakfast Club, host Mat Pullen of Jamf discusses how to create a successful digital classroom with Sari Lantoo of the Ylitornion Yhteiskoulun Lukio School in Finland and Rachel Smith from Showbie.

February 13, 2023 by Jesus Vigo

Telemetry series: Full automation and correlation

Part three of the blog series on telemetry goes to the next level, specifying what administrators can do with the granular data collected from endpoints within their infrastructure. Particularly how this data is useful when detecting suspicious and unknown threats that may lurk undetected, as well as how pairing telemetry data with security solutions can enhance efficiency and your security posture through automation.

February 9, 2023 by Haddayr Copley-Woods

Securing modern healthcare

It seems as if every day in the past weeks has seen a headline about a breach in another healthcare organization. How did we get here? What can healthcare organizations do about it?

February 9, 2023 by Hannah Hamilton

How does Jamf keep your information secure?

You use Jamf to manage and secure your devices—how does Jamf secure your data? This blog will mention some of the ways we ensure your data is protected.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.