Jamf Blog

Posts in the Government Category

April 11, 2023 by Jesus Vigo

Detecting Insider Threats

Media reports of external attacks that lead to data breaches are a common occurrence these days. But just as devastating to an organization are internal attacks, stemming from insider threats that often go unnoticed until it's too late. Learn about these types of threats, how to spot the signs and what solutions are available to detect and protect against them.

March 31, 2023 by Jesus Vigo

Top security challenges and how to overcome them: Compliance regulations

Discover the top challenges affecting IT and Security teams when it comes to successfully handling regulatory compliance, including assessing risks to endpoints and processes, implementing frameworks to best harden devices and overcoming the challenges of maintaining cyber security compliance by securely sharing telemetry data and developing automated workflows.

March 15, 2023 by Jesus Vigo

macOS security: the ultimate guide

In this series of articles, Jamf uncovers the seedy underbelly of Mac and iOS-based security threats in an effort to provide clear guidance on how to best protect your desktop and mobile device endpoints through a combination of information and best practices regarding Apple security basics for users new to the platform all the way to those that are tasked with shoring up the security of data and protecting end-user privacy.

March 13, 2023 by Ivna O'Neill

NIS2 Directive: What does it mean to senior managers and their cybersecurity strategy?

In this concluding blog of the series that analyzes the changes to the Network and Information Security regulations by the European Union, we focus on what the changes mean to top-level executives and the factors to consider when building cybersecurity strategies going forward.

February 24, 2023 by Ivna O'Neill

NIS2 Directive: What does it mean to security teams?

Part two of this blog series analyses the changes to the Network and Information Security regulations by the European Union, covering aspects of the cybersecurity risk-management measures and how they come together to improve cybersecurity capabilities for organizations.

February 13, 2023 by Jesus Vigo

Telemetry series: Full automation and correlation

Part three of the blog series on telemetry goes to the next level, specifying what administrators can do with the granular data collected from endpoints within their infrastructure. Particularly how this data is useful when detecting suspicious and unknown threats that may lurk undetected, as well as how pairing telemetry data with security solutions can enhance efficiency and your security posture through automation.

January 31, 2023 by Haddayr Copley-Woods

Should you block TikTok?

An increasing number of governmental and educational organizations have decided to block TikTok from their networks. Here's why, and how you can do the same if you wish.

January 27, 2023 by Jesus Vigo

Telemetry series: Collection and Storage (SIEM)

Part two of the blog series on telemetry explores the data-gathering and storage aspects of collecting rich telemetry data. Also, exploring what options are available to organizations to meet their needs, as well as some useful tips to consider when preparing to work with granular data and how to leverage it into actionable tasks, such as how it can inform management workflows.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.