Jamf Blog

Posts in the Security Category

July 13, 2021 by Jesus Vigo

Advanced incident response and remediation guide

Overview of the advanced processes and methodologies, based on industry best practices, to help your organization develop and implement holistic Incident Response and Remediation (IR&R) plans to protect its devices, users and keep data secure.

July 12, 2021 by Mark Walker

Updated device security guidance from the UK’s National Cyber Security Centre

NCSC has recently re-branded and re-launched its Device Guidance and Mobile Device Guidance. These settings are far more cost- and time-effective for organisations of all sizes to implement via Mobile Device Management (MDM).

June 14, 2021 by Jonathan Locast

Unlocking passwordless Mac authentication

Jamf Connect expands secure identity and access to resources with Jamf Unlock, passwordless authentication from an iPhone app to securely unlock Mac and the resources needed to be productive.

June 2, 2021 by Matthias Wollnik

Jamf boosts security and compliance solutions with the launch of Compliance Reporter

An exciting day in the Mac compliance and security world, Jamf launches Compliance Reporter, providing more visibility into Mac activity for threat hunting purposes and compliance checks.

June 2, 2021 by Josh Stein

Stop potential AirDrop transfer data leaks with Jamf Protect

Jamf Protect can centralize Unified Logging data to allow for filtering and better searches. One use-case is detecting outbound AirDrop transfers and logging them to prevent possible data leaks.

May 28, 2021 by Stuart Ashenbrenner

Apple updates both XProtect and MRT

These updates bring XProtect to version 2147 and MRT to version 1.79, respectively.

May 27, 2021 by Jesus Vigo

3 ways to secure Mac in Higher Education with Jamf Protect

Higher Education is no stranger to security threats of all types. The growing adoption of Mac computers coupled with distance learning has created a unique security void that requires a solution that aligns itself with Apple's Endpoint Security Framework to prevent malware, detect known threats and provide remediation to bring devices into compliance with school policies and regulatory requirements.

May 24, 2021 by Jaron Bradley

Zero-Day TCC bypass discovered in XCSSET malware

A zero-day discovery allows an attacker to bypass Apple’s TCC protections which safeguard privacy. By leveraging an installed application with the proper permissions set, the attacker can piggyback off that donor app when creating a malicious app to execute on victim devices, without prompting for user approval.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.