Jamf Blog

Posts in the Security Category

August 10, 2022 by Hannah Hamilton

What is threat hunting?

The ever-evolving landscape of technology demands a keen eye to keep security vulnerabilities in your sights. How can you ensure that your assets are protected from known threats, bad actors or future attacks waiting to pounce? Enter threat hunting.

August 5, 2022 by Tim Herr

Content filtering doesn’t need to equal surveillance

Many well-meaning products and practices for monitoring students’ internet use end up collecting sensitive information about them. Some even put the information to questionable use. How do we keep students safe from inappropriate and harmful content and create a safe and trusting learning environment, without invading their privacy or negatively impacting their education?

August 1, 2022 by Michael Covington

Key insights from Verizon Mobile Security Index 2022

Mobile security expert Michael Covington outlines important takeaways from Verizon's new report on workplace transformation and the modern threat environment.

July 20, 2022 by Micah Spady

Jamf and PKI: A strong foundation for Zero Trust security

Discover why a public key infrastructure (PKI) is such an important component to start with when coming up with the architecture for a Zero Trust Network Access (ZTNA) approach.

July 19, 2022 by Jamf Threat Labs

CloudMensis malware stealing your joy? Jamf’s got you covered!

CloudMensis is a new macOS spyware discovered by ESET. Researchers noted that this malware’s primary goal is to exfiltrate data, such as documents, keystrokes, screen captures, emails and other potentially sensitive data.

July 14, 2022 by Jesus Vigo

Most critical misses in security

The important role that cybersecurity plays in modern computing cannot be understated. Simply put, when integrated as part of a holistic solution, security:

  • Keeps data secured from unauthorized access
  • Protects users from threats that impact productivity
  • Hardens devices against known and unknown attacks
  • Enforces organizational policies, maintaining compliance

When implemented as a half-measure or unvetted solution to a larger problem, it may have the adverse effect of growing into a vulnerability, compromise or full-scale data breach.

In this blog, we discuss these near-misses and how they affect your security posture, as well as how to better insulate your organization against missing critical points in their cybersecurity plan.

July 6, 2022 by Kat Garbis

Jamf + Cisco improving remote and hybrid work environments

At the most recent Cisco Live event, we saw a massive interest in Zero Trust Network Access (ZTNA) and solutions that empower remote workers. Read on and watch the video to learn about how Jamf Pro integrates with and extends Cisco’s enterprise networking solutions.

June 29, 2022 by Laurie Mona

How to modernize cybersecurity in higher education

Learn how to keep higher education students and educators protected, compliant, and thriving by solving key challenges and threats to cybersecurity.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.