Jamf Blog

1965 more articles are waiting for you.

June 3, 2022 by Jamf Threat Labs

Jamf protects against CrateDepression malware

SentinelOne researchers recently investigated a supply chain attack leveraging a malicious crate named ‘rustdecimal’ in the crates.io Rust community crate repository.

June 3, 2022 by Laurie Mona

Top reasons to use Apple TV for your digital signage

Make it easier for your organization to share dynamic messages by integrating Apple TV, Carousel Digital Signage and Jamf.

June 2, 2022 by Tim Herr

Engaging AR learning activities for the classroom and home

Augmented reality (AR) has enabled new learning models that can be equally effective for students studying on school campuses or isolating at home. Discover how educators at ACS International Schools have successfully integrated AR into K-12 curriculums to enhance learning and empower teachers.

June 2, 2022 by Jamf Threat Labs

Jamf protects against ‘pymafka’ malware

Sonatype researchers recently identified a supply chain attack leveraging a malicious Python package ‘PyMafka’ in the PyPI registry.

June 2, 2022 by Kaylee Carlson

Jamf named a Unified Endpoint Management leader

We aren’t much for bragging, so thank goodness someone else said it: IDC MarketScape has named Jamf a Leader in Unified Endpoint Management (UEM) software for Apple devices.

May 31, 2022 by Jesus Vigo

Acceptable Use Policy for workplace technology

Organizations use Acceptable Use Policies (AUP) to set forth guidelines for employees and company practices. This aligns them with industry best practices, laws and regulatory compliance. In this blog, we go into further detail as to: What is an AUP? Why are they important? What do AUPs commonly include?

May 26, 2022 by Jesus Vigo

Mac security series: Mac is inherently safer (doesn’t require frequent updates)

Welcome to another installment of the macOS Security Basics series! In this segment, Jamf shines a light on macOS security, more specifically, we discuss the basics that go into fortifying your Mac device, including misconceptions and long-held beliefs that just aren’t quite true or simply do not fit in with the modern-day computing environment. The topic of choice this time around? Updating your macOS – more specifically – the incorrect belief that Mac (and Apple devices, et al.) don’t need updates, because they’re designed to be inherently safe.

May 25, 2022 by Jesus Vigo

2022 Verizon Data Breach Investigations Report Summary

Marking its fifteenth year, Verizon’s Data Breach Investigations Report analyzes data breach demographics spread across multiple industry verticals, providing results based on breach cases and incidents reviewed. The data gleaned from its analysis provides organizations insight into what threat types are driving attacks and how trends play a significant role over time in security. Additional guidance is provided based on quantifiable data from industry leaders, such as Jamf. Verizon also includes security recommendations, indicators of compromise and next steps to take after a breach has been identified, from very small businesses to large enterprises.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.