Jamf Blog

1952 more articles are waiting for you.

Not all security challenges come in the form of threat actors that seek to directly (or indirectly) compromise devices, users and data. In fact, among the most challenging and downright frustrating concerns are those that stem from risks that are not addressed due to budgetary matters minimizing an organization's ability to effectively protect its resources. The inability to demonstrate the true value gleaned from security controls through traditional ROI protocols is just as difficult and similarly frustrating…but it doesn’t have to be.

May 30 2023 by

Jesus Vigo

Cyber threats come from all sides. As bad actors continue to evolve their toolsets to more succinctly attack targets, organizations are faced with the challenges of preparing for threats while implementing mitigations to address them as quickly and efficiently as possible. One of the most critical are external threats originating from outside the organization – proving to be amongst the most common threat types and the most difficult to protect against – but not impossible to address with a holistic, comprehensive security strategy.

May 26 2023 by

Jesus Vigo

Following the release of the Jamf Security 360: Annual Threat Trends Report 2023, where we highlight security threat trends, we utilize threat intelligence gathered by Jamf to inform security professionals about which threats from the previous year most critically affected the enterprise. Preserving user privacy is a growing threat that the data supports and is the focus of this blog series. Understanding its criticality to endpoint security and identifying which data types are at risk helps IT and Security teams know what to look for and how to mitigate risk best.

May 23 2023 by

Jesus Vigo

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.