Jamf Blog

Posts in the Security Category

March 5, 2025 by Chris Deane

Burner phones: secure choice or security risk?

Find out if burner phones are sufficient to protect your organization's security abroad.

March 3, 2025 by Jesus Vigo

Going Further: Maintaining Cyber Essentials and Broader Compliance

Continuing our Cyber Essentials blog series, we take a deeper look at maintaining into compliance. In this second part, we focus on the critical role telemetry plays in organizations continuing to meet the compliance requirements.

February 28, 2025 by Jamf Threat Labs

Event analysis with Jamf telemetry

Endpoint telemetry is crucial for securing your device fleet. Learn how Jamf can help your organization analyze a variety of events.

February 26, 2025 by Jesus Vigo

macOS Security Basics Series: The One Where Your Data Wasn’t Encrypted with FileVault

Encrypting your data is no longer the stuff of thriller novels or spy yarns. It is a fundamental security control that prevents unauthorized users from accessing your personal, corporate and privacy data whenever your Mac is not in use. Combining its benefits with a dead simple setup makes FileVault a “no-brainer” for all users, leaving them to wonder why they didn’t enable it sooner.

February 13, 2025 by Sean Smith

Using Mac Endpoint Telemetry for Compliance with Regulatory Frameworks

Learn how Jamf's Mac Endpoint Telemetry helps organizations along their compliance path across multiple industries and geographies.

February 5, 2025 by Jesus Vigo

Cyber Essentials Series: Deep dive into Cyber Essentials Plus (CE+)

Continuing our Cyber Essentials blog series, we take a deeper dive into Cyber Essentials Plus (CE+). In this second part, we focus on the assessment process and how Jamf supports organizations to meet the stricter requirements.

January 16, 2025 by Jesus Vigo

Cyber Essentials Series: What it is and why it’s important

NCSC has recently re-branded and re-launched its Device Guidance and Mobile Device Guidance. These settings are far more cost- and time-effective for organisations of all sizes to implement via Mobile Device Management (MDM).

January 8, 2025 by Jesus Vigo

Best Practices: Enterprise Threat Defense

In this blog, discover the best practices for defending your enterprise from modern threats and how the strategies combine to form a defense-in-depth strategy to strengthen device and organizational security postures.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.