Jamf Blog

Posts in the Security Category

November 13, 2019 by Jonathan Locast

DLP is no problem for me: Data Loss Protection and macOS Catalina

Be it an inside our outside threat, Code42 talks data loss protection during 2019 JNUC.

November 13, 2019 by Rhiannon Owen Jones

Stories of Jamf Connect and Azure Directory Federation Services

Members from Insight took to the JNUC stage to discuss use cases they've encountered with Jamf Connect and Azure Directory Federation Services. Read now.

November 13, 2019 by Matt Woodruff

Announcing Jamf Protect – Jamf’s endpoint security solution purpose-built for Mac

Matt Woodruff, Security Solutions Lead, and Andrew Medearis, Senior Product Manager of Jamf Protect, took the stage at JNUC to dive into everything you need to know about Jamf’s latest addition to its product line and why Jamf is expanding into Mac security.

November 12, 2019 by Jonathan Locast

The Mac security lesson you may need: “Eat your own dog food”

Security experts discuss the importance of "living in the shoes of a normal user, not an admin” during this JNUC 2019 session.

October 28, 2019 by Liarna La Porta

How do I know if I’ve been cryptojacked?

Cryptojacking, the unauthorized use of a computer to mine cryptocurrency, is an increasingly common threat. How do you spot the warning signs, and how do you prevent cryptojacking attempts?

October 24, 2019 by Liarna La Porta

Trojan malware infecting 17 apps on the App Store

Jamf's threat research team has discovered 17* apps on the Apple App Store that are infected with clicker trojan malware. The apps communicate with a known command and control (C&C) server to simulate user interactions in order to fraudulently collect ad revenue.

June 26, 2019 by Kat Garbis

Apple device security misconceptions (and how to get ahead of them)

Security is a top priority for any IT admin, no matter which platform(s) they are supporting. Read this for a tutorial on Apple device security.

December 19, 2018 by Matt Urwin

Top 5 Types of Sideloaded Apps and the Risks They Pose

It seems there are endless ways in which your mobile device can be attacked. With scary mental images of devious hackers chipping away at our mobile device’s security, it’s easy to forget that the most common way for a device to be compromised is through careless action by the end-user. One such action is to sideload risky applications to the device.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.