Jamf Blog

Posts in the Government Category

November 14, 2024 by Jesus Vigo

Anatomy of an Attack: Atomic Stealer malware

Learn about the cyber kill chain and how to use it to learn more about the threats and threat actors targeting your enterprise. Also, Jamf Threat Labs takes you on a deep dive into the anatomy of an attack, dissecting each phase of an attack by the Atomic Stealer malware.

October 30, 2024 by Jesus Vigo

Why Apple Intelligence and Private Cloud Compute are so different and secure

Learn about the security and privacy controls in Apple Intelligence and how Apple’s revolutionary approach to designing the Private Cloud Compute infrastructure sets it apart from AI models hosted in cloud-based environments. Furthermore, understand how Apple succeeds where others are subject to common data security vulnerabilities and user privacy risks.

October 21, 2024 by Jesus Vigo

Deploying Apple devices in hard hat/manufacturing industries

Manufacturing and hard hat industries benefit greatly from powerful yet easy-to-use Apple devices that transform processes and drive innovation. Learn about how Apple and Jamf help these industries transition business workflows to the digital age.

August 16, 2024 by Katie John

Microsoft + Jamf: Shared Device Mode update

One of the benefits Microsoft and Jamf’s partnership yields is Shared Device Mode, aiding frontline workers relying on shared iOS and iPadOS devices to work more efficiently by integrating identity and security solutions to provide just-in-time conditional access workflows. Read our blog for the latest update on when Jamf and Microsoft will deliver Shared Device Mode to meet customers’ unique needs.

August 16, 2024 by Jamf Professional Services and Consulting Engineering Teams

Jamf Migrate

Learn how Jamf Migrate and our Professional Services Team work together with your organization to migrate from your existing MDM provider to Jamf Pro effortlessly and without interrupting business continuity or user productivity.

August 8, 2024 by Jesus Vigo

What is Privilege Escalation?

Privilege Escalation enables unauthorized access to sensitive systems, placing confidential data at risk. Learn why organizations must mitigate this critical vulnerability and what strategies are effective in keeping endpoints protected.

August 5, 2024 by Jesus Vigo

Acceptable Use Policy for workplace technology

Organizations use Acceptable Use Policies (AUP) to set forth guidelines for employees and company practices. This aligns expectations for the use of computers and mobile devices with industry best practices, laws and regulatory compliance.

June 10, 2024 by Hannah Bien

Apple WWDC24: Keynote recap

Get an overview of the latest announcements from Apple at World Wide Developers Conference (WWDC) 2024. Built with privacy in mind, new features include personalization options, productivity and collaboration enhancements, and Apple Intelligence.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.