Jamf Blog

Posts in the Security Category

November 12, 2024 by Hannah Hamilton

What is endpoint hardening?

Learn about endpoint hardening: what it is, its benefits and best practices.

November 12, 2024 by Jamf Threat Labs

APT Actors Embed Malware within macOS Flutter Applications

Jamf Threat Labs discovered malware samples believed to be tied to the Democratic People's Republic of Korea (DPRK), aka North Korea, that are built using Flutter, which by design provides obfuscation to the malicious code. JTL performs a deep dive into how the malicious code works to help protect users on macOS devices.

November 8, 2024 by Hannah Hamilton

Endpoint security best practices

Start your endpoint security journey with some best practices.

October 31, 2024 by Hannah Hamilton

OS upgrades, security and Apple Intelligence

It’s an old saying: the most secure software is up-to-date software. But it is also true. By using the latest version of software, you will improve the security posture of your users, devices and entire IT infrastructure. This blog highlights how upgrading your Apple operating systems across your devices creates a more secure organization.

October 31, 2024 by Hannah Hamilton

Jamf After Dark: get to know Jamf Threat Labs

Get an inside look at Jamf Threat Labs in this episode of Jamf After Dark.

October 30, 2024 by Jesus Vigo

Why Apple Intelligence and Private Cloud Compute are so different and secure

Learn about the security and privacy controls in Apple Intelligence and how Apple’s revolutionary approach to designing the Private Cloud Compute infrastructure sets it apart from AI models hosted in cloud-based environments. Furthermore, understand how Apple succeeds where others are subject to common data security vulnerabilities and user privacy risks.

October 22, 2024 by Liarna La Porta

Back to security basics: phishing

Phishing is responsible for the majority of cyber attacks, affecting users and organizations financially and personally. In this blog, we go back to the basics of what phishing is, what an attack looks like and what steps can be taken to prevent falling victim to phishing attacks.

October 8, 2024 by Haddayr Copley-Woods

Endpoint security with Chrome Enterprise and Jamf

Learn about how Chrome Enterprise and Jamf can work together to create a new endpoint security standard.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.