Jamf Blog

Posts in the Security Category

November 10, 2023 by Jesus Vigo

Defending the Digital Frontier: Safeguarding Against Malware in a Globally Connected World

For our November edition of the Jamf Security Lounge, our host Aaron Webb, Senior Product Marketing Manager, Security, is joined by guest Harald Bosman, Senior macOS Engineer and Endpoint Security Expert at Amsterdam Internet Exchange (AMS-IX) where they discuss:

  • How managing and securing mobile devices minimizes the risk of attack
  • and how Jamf plays a critical role in the defense strategy at AMS-IX
November 1, 2023 by Jesus Vigo

What platforms does Jamf support?

Threats don't sleep. They also don't discriminate against device types or target just one platform. So, why should your enterprise security strategy be any different?

Pro Tip: it shouldn't.

Bad actors are hoping you don't know this, but Jamf does. That's why in this blog, we discuss why it's critical for security solutions to support multiple platforms in order to be truly holistic and offer comprehensive protections against existing and evolving threats that target your fleet - not just one type of device on a single platform.

October 31, 2023 by Anthony Darlow

App Installers now available for Jamf School

During the keynote at JNUC 2023, App Installers for Jamf School was released to much applause and cheer — especially from the many education-focused Jamf Admins in the crowd. But what are App Installers and why did it get everyone so excited?

October 26, 2023 by Ben Arent

Protecting infrastructure with device trust

With an increase in sophisticated attacks targeting engineers, securing and protecting access to critical infrastructure is becoming increasingly important. Read on to see how teams are using Jamf Pro and Teleport to enforce access to only trusted devices.

October 25, 2023 by Hannah Hamilton

Jamf Security Lounge: Cyber mindfulness — Reducing risk during a stress epidemic

Employees are dealing with a changing workplace and world beyond anyone’s control, leading to stress, distraction and burnout. This episode of Jamf Security Lounge talks about The Zensory, an app with the aim of improving employee well-being. Learn more about The Zensory and how Nedbank uses the app for cybersecurity.

October 23, 2023 by Liarna La Porta

Malicious profiles – one of the most serious threats to mobile devices

Find out how threat actors maliciously deploy configuration profiles to your Apple devices as part of their attack chain, and what you can do to prevent them.

October 18, 2023 by Jesus Vigo

What is a Whaling phishing attack and how to prevent it

Threats impacting your cybersecurity defenses continue to grow and evolve from one type of form to another. Advanced Persistent Threats (APT) and converged threat types were already difficult to detect, and now existing threats, like Whaling, are getting supercharged by AI to become more efficient and scalable. In this blog, we delve into Whaling Phishing attacks:

  • What Whaling attacks are?
  • How do they impact cybersecurity?
  • Provide examples of real-world attacks
  • Breakdown the anatomy of a Whaling attack
  • and discuss the different ways to prevent them
October 17, 2023 by Jesus Vigo

Assessing your organization’s security needs: Why it’s critical to your overall security posture

Understanding the security needs of an organization is only one component of maintaining a strong security posture. Knowing the risks that are unique to your organization and assessing them accurately are critical to the overall security posture as well.

In this paper, learn:

  • What risk is and how telemetry data collected provides visibility into device health and overall security posture
  • Why assessing risk must be performed at a regular cadence, iteratively as part of the security stack
  • How this data aids your organization in not only determining its security needs but also how to use it to protect against current and future risks
  • Why integrating risk data with endpoint security solutions helps organizations maintain a strong security posture while meeting compliance goals
Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.