Jamf Blog

Posts in the Security Category

April 30, 2024 by Hannah Hamilton

Jamf named CVE Numbering Authority

Jamf has been authorized by the Common Vulnerabilities and Exposures (CVE) program as a CVE Numbering Authority! Learn more about the CVE program and what this means for Jamf.

April 25, 2024 by Jesus Vigo

Defense-in-depth: Understanding and adapting security for the modern threat landscape

Learn more about closing gaps in security by integrating and layering solutions.

April 17, 2024 by Jesus Vigo

Choosing the right IT security partner: How Jamf fulfills your IT security need

Learn how choosing the right partner for your security needs can veritably make or break your cybersecurity plan. Also, gain a better understanding of how Jamf solutions integrate to address the challenges of the modern threat landscape through Trusted Access for top-to-bottom and end-to-end protection of your enterprise.

April 12, 2024 by Michael Devins

Mitigate mercenary spyware attacks for iPhone with Jamf Executive Threat Protection

Explore a comprehensive mobile security strategy that defends against the most sophisticated attacks impacting users.

April 12, 2024 by Hannah Hamilton

What is threat detection?

Threats of all kinds put our cybersecurity in danger. Learn about common threat types and how to detect them.

April 8, 2024 by Aaron Webb

Jamf Connect feature: Limit Application Access for Unmanaged Devices

Strengthening mobile security is critical. Especially for unmanaged devices that lack the management, identity and security controls of managed endpoints. In this blog, learn how Jamf Connect’s newest feature adds a layer of security to protect against unauthorized access and data breaches.

April 5, 2024 by Jamf Threat Labs

Infostealers continue to pose threat to macOS users

Jamf Threat Labs dissects ongoing infostealer attacks targeting macOS users. Each with different means of compromising the victim’s Macs but with similar aims: to steal sensitive user data.

April 3, 2024 by Hannah Hamilton

What is endpoint security?

Keeping your endpoints secure is necessary for data protection. Learn what endpoint security is, what it defends against and tools to use for endpoint protection.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.