Jamf Blog

Posts in the Security Category

May 30, 2023 by Jesus Vigo

Top security challenges and how to overcome them: Budgetary constraints + demonstrating ROI

Not all security challenges come in the form of threat actors that seek to directly (or indirectly) compromise devices, users and data. In fact, among the most challenging and downright frustrating concerns are those that stem from risks that are not addressed due to budgetary matters minimizing an organization's ability to effectively protect its resources. The inability to demonstrate the true value gleaned from security controls through traditional ROI protocols is just as difficult and similarly frustrating…but it doesn’t have to be.

May 26, 2023 by Jesus Vigo

Top security challenges and how to overcome them: Prepare for & address external threats

Cyber threats come from all sides. As bad actors continue to evolve their toolsets to more succinctly attack targets, organizations are faced with the challenges of preparing for threats while implementing mitigations to address them as quickly and efficiently as possible. One of the most critical are external threats originating from outside the organization – proving to be amongst the most common threat types and the most difficult to protect against – but not impossible to address with a holistic, comprehensive security strategy.

May 25, 2023 by Hannah Hamilton

5 things you need to know about BYOD security

Considering a BYOD program? In this blog, we’ll discuss a few ways BYOD affects your organization's security posture.

May 23, 2023 by Jesus Vigo

Security 360 Highlights: User privacy

Following the release of the Jamf Security 360: Annual Threat Trends Report 2023, where we highlight security threat trends, we utilize threat intelligence gathered by Jamf to inform security professionals about which threats from the previous year most critically affected the enterprise. Preserving user privacy is a growing threat that the data supports and is the focus of this blog series. Understanding its criticality to endpoint security and identifying which data types are at risk helps IT and Security teams know what to look for and how to mitigate risk best.

May 22, 2023 by Jamf Threat Labs

The Mysteries Behind ColdIntro and ColdInvite: TL;DR edition

Learn about the discovery of a novel threat vector on iPhone that allows attackers to circumvent security mitigations by exploiting under-protected co-processors, leveraging access to further compromise the iOS kernel.

May 16, 2023 by Jesus Vigo

Security 360 highlights: Phishing and social engineering

Following the release of the Jamf Security 360: Annual Threat Trends Report 2023 where we highlight security threat trends, we utilize threat intelligence gathered by Jamf to inform security professionals which threats from the previous year most critically affected the enterprise. The data in this blog series helps inform IT and Security teams of the continued reliance on social engineering attacks by threat actors. Also, by identifying various attack types, like phishing and how they are leveraged, users can be better informed on how to spot these attacks and know how to prevent them from compromising devices, user credentials and sensitive data.

May 12, 2023 by Brandon Arcement

What does “Trusted Access for the physical workplace” mean?

Jamf support for digital employee badges is now available via SwiftConnect, integrated with Jamf Trust, for iOS and coming soon for Android

May 3, 2023 by Braden Newell

A Mac app deep dive

Jamf takes you on a deep dive into the in's and out's of Mac applications, discussing the differences and similarities between the various app types, and also explaining how this information is essential for MacAdmins charged with device management, maintaining the device security posture of Macs in their fleet and how Jamf blends best practices with automated tooling to make patch management is a breeze.

Browse Blog
by Category:
Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.