Jamf Blog

Posts in the Security Category

February 23, 2023 by Jamf Threat Labs

Evasive cryptojacking malware targeting macOS found lurking in pirated applications

Over the past few months Jamf Threat Labs has been following a family of malware that resurfaced and has been operating undetected, despite an earlier iteration being a known quantity to the security community. In this article, we’ll examine this malware and the glimpse it offers into the ongoing arms race between malware authors and security researchers as well as highlight the need for enhanced security on Apple devices to ensure their safe and effective use in production environments.

February 21, 2023 by Jesus Vigo

AI + ML: what it means for IT and InfoSec

Artificial Intelligence and Machine Learning are both advanced technologies that can do far more to help us work smarter, not harder than we can possibly contemplate. What the future holds is anyone’s guess, but the burning question we look at today is: how do they impact IT and InfoSec and the roles of the individuals tasked with securely managing endpoints?

February 17, 2023 by Jonathan Locast

Jamf Safe Internet protects everywhere that students learn

Jamf Safe Internet, offering comprehensive content-filtering technology and endpoint protection for students, was launched last year. Here’s a bit more about how our school internet filtering works — and why school web filters are important.

February 16, 2023 by Hannah Hamilton

Top security priorities: identity and access controls

Identity and access controls are key to keeping access to your company resources in the hands of authorized users. This next blog in the Top Security Priorities series will discuss a few access control practices for your organization to implement.

February 13, 2023 by Jesus Vigo

Telemetry series: Full automation and correlation

Part three of the blog series on telemetry goes to the next level, specifying what administrators can do with the granular data collected from endpoints within their infrastructure. Particularly how this data is useful when detecting suspicious and unknown threats that may lurk undetected, as well as how pairing telemetry data with security solutions can enhance efficiency and your security posture through automation.

February 9, 2023 by Haddayr Copley-Woods

Securing modern healthcare

It seems as if every day in the past weeks has seen a headline about a breach in another healthcare organization. How did we get here? What can healthcare organizations do about it?

February 9, 2023 by Hannah Hamilton

How does Jamf keep your information secure?

You use Jamf to manage and secure your devices—how does Jamf secure your data? This blog will mention some of the ways we ensure your data is protected.

February 7, 2023 by Ivna O'Neill

EU ramps up its cybersecurity efforts with NIS 2

The latest version of Europe’s cybersecurity strategy, approved by the European Parliament in November 2022, is broader, clearer, and more likely to be future proof. In the first post of a series, we will explore what this means for EU organizations.

Browse Blog
by Category:
Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.