Jamf Blog

Posts in the Security Category

February 1, 2023 by Kaylee Carlson

Jamf security: simplified.

Jamf has consolidated its Mac endpoint security and Mac authentication offerings into two comprehensive products: Jamf Connect and Jamf Protect. Here’s the breakdown of how we’ve still got you covered— and on more devices!

January 31, 2023 by Haddayr Copley-Woods

Should you block TikTok?

An increasing number of governmental and educational organizations have decided to block TikTok from their networks. Here's why, and how you can do the same if you wish.

January 30, 2023 by Jesus Vigo

What is (ML) Machine Learning in Security?

In this blog series on AI, we delve into a subset of this technology called Machine Learning (ML) and how it’s designed to effectively “learn” from all manner of resources available to grow its understanding and skills. In the case of cybersecurity, ML can be taught to increase the security posture of your endpoints – and your organization’s overall network – by monitoring, identifying, hunting, detecting and remediating against known and unknown threats as part of Deep Learning practices.

January 30, 2023 by Nicholas Cassady

BYOD, or: How I Learned to Stop Worrying and Bring My Own Device

Do you worry about Big Brother when you think about using your own phone for work? With Apple BYOD and Jamf management, you’ve got no worries!

January 27, 2023 by Jesus Vigo

Telemetry series: Collection and Storage (SIEM)

Part two of the blog series on telemetry explores the data-gathering and storage aspects of collecting rich telemetry data. Also, exploring what options are available to organizations to meet their needs, as well as some useful tips to consider when preparing to work with granular data and how to leverage it into actionable tasks, such as how it can inform management workflows.

January 26, 2023 by Hannah Hamilton

Top security priorities: data protection

In the next part of the Top Security Priorities series, we’ll explore the types of data that needs protection, the rules and regulation surrounding data, and some data security best practices to consider.

January 25, 2023 by Jesus Vigo

Top 10 security threats from 2022 to learn from

With 2022 in the rearview, we take a look back at the indelible impact left by cybersecurity threats. Come on this voyage with us, as we don’t just highlight the top ten threats from last year, but also glean what we learned from them as organizations of all sizes and industries use that knowledge to fortify their defenses in 2023.

January 23, 2023 by Tim Herr

Shore up security with advanced Mac management techniques

Learn about some of the ways that IT admins can use Jamf MDM to improve an organization’s security posture.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.