Jamf Blog

Posts in the Government Category

March 12, 2024 by Aaron Webb

Safeguarding against the rise of mobile malware: Actions to take following recent incidents

Learn how the evolving threat landscape finds threat actors increasingly targeting mobile devices to exploit sensitive resources and what steps organizations can take to minimize risks while strengthening their overall security posture.

March 6, 2024 by Jesus Vigo

Crisis Control: Close security gaps with incident response and recovery

Risk vectors can be mitigated and attack surfaces hardened against threats. But security gaps happen. With a robust incident response and recovery plan, gaps can be minimized so that known threats are prevented and unknown threats can be detected proactively before they can become something worse.

February 23, 2024 by Jesus Vigo

14 things you need to know about IT security compliance

Learn about IT and security compliance, answering critical questions about their differences, similarities and more importantly, how best practices help your organization develop their IT security compliance plan.

February 20, 2024 by Sean Smith

What’s new in Jamf Pro 11.3

Jamf releases Jamf Pro 11.3!

In this blog, you will learn about how the new features and functionalities included in the Jamf Pro 11.3 release.

January 24, 2024 by Jesus Vigo

Balancing Security + Compliance

Learn about the basics of compliance in cybersecurity and why it is a crucial component of your organization’s security posture. Also, understand how achieving a balance between security and compliance is table stakes for regulated businesses and how critical factors like key regulations, industry standards and best practices, integrated alongside advanced technologies and security tooling, work hand in glove to benefit organizations while minimizing the risk of non-compliance.

November 30, 2023 by Jesus Vigo

Streamline device redeployment workflows with Return to Service Command

It's never been simpler to redeploy devices or sanitize shared ones in a secure, efficient manner while ensuring they are reenrolled with your MDM solution, ready for new users. Learn more about how Apple’s Return to Service Command helps IT achieve this quickly and easily.

November 1, 2023 by Jesus Vigo

What platforms does Jamf support?

Threats don't sleep. They also don't discriminate against device types or target just one platform. So, why should your enterprise security strategy be any different?

Pro Tip: it shouldn't.

Bad actors are hoping you don't know this, but Jamf does. That's why in this blog, we discuss why it's critical for security solutions to support multiple platforms in order to be truly holistic and offer comprehensive protections against existing and evolving threats that target your fleet - not just one type of device on a single platform.

October 18, 2023 by Jesus Vigo

What is a Whaling phishing attack and how to prevent it

Threats impacting your cybersecurity defenses continue to grow and evolve from one type of form to another. Advanced Persistent Threats (APT) and converged threat types were already difficult to detect, and now existing threats, like Whaling, are getting supercharged by AI to become more efficient and scalable. In this blog, we delve into Whaling Phishing attacks:

  • What Whaling attacks are?
  • How do they impact cybersecurity?
  • Provide examples of real-world attacks
  • Breakdown the anatomy of a Whaling attack
  • and discuss the different ways to prevent them
Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.