Jamf Blog

1952 more articles are waiting for you.

Threats impacting your cybersecurity defenses continue to grow and evolve from one type of form to another. Advanced Persistent Threats (APT) and converged threat types were already difficult to detect, and now existing threats, like Whaling, are getting supercharged by AI to become more efficient and scalable. In this blog, we delve into Whaling Phishing attacks: What Whaling attacks are? How do they impact cybersecurity? Provide examples of real-world attacks Breakdown the anatomy of a Whaling attack and discuss the different ways to prevent them

October 18 2023 by

Jesus Vigo

Jamf releases Jamf Pro 11.0! In this blog, learn more about the blending of modern design principles and the powerful management workflows our customers are accustomed to. Paired with new exciting features that ensure that MacAdmins of all experience levels feel right at home with the latest iteration of the best-in-breed, Apple-first, Apple-best MDM solution.

October 17 2023 by

Kaylee Carlson

Sean Smith

Understanding the security needs of an organization is only one component of maintaining a strong security posture. Knowing the risks that are unique to your organization and assessing them accurately are critical to the overall security posture as well. In this paper, learn: What risk is and how telemetry data collected provides visibility into device health and overall security posture Why assessing risk must be performed at a regular cadence, iteratively as part of the security stack How this data aids your organization in not only determining its security needs but also how to use it to protect against current and future risks Why integrating risk data with endpoint security solutions helps organizations maintain a strong security posture while meeting compliance goals

October 17 2023 by

Jesus Vigo

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.