Jamf Blog

Posts in the Security Category

June 3, 2022 by Tim Herr

How IT can improve security in healthcare organizations

The “Healthcare Security for Beginners” e-book offers an overview of cyber threats and effective defenses geared to the specifics of the healthcare industry.

June 3, 2022 by Jamf Threat Labs

Jamf protects against CrateDepression malware

SentinelOne researchers recently investigated a supply chain attack leveraging a malicious crate named ‘rustdecimal’ in the crates.io Rust community crate repository.

June 2, 2022 by Jamf Threat Labs

Jamf protects against ‘pymafka’ malware

Sonatype researchers recently identified a supply chain attack leveraging a malicious Python package ‘PyMafka’ in the PyPI registry.

May 26, 2022 by Tim Herr

Learn the fundamentals of cybersecurity for K-12 education

Get a glimpse at the illuminating contents of our e-book, “K-12 Security Essentials for Beginners,” covering the fundamentals of cybersecurity in primary and secondary education.

May 26, 2022 by Jesus Vigo

Mac security series: Mac is inherently safer (doesn’t require frequent updates)

Welcome to another installment of the macOS Security Basics series! In this segment, Jamf shines a light on macOS security, more specifically, we discuss the basics that go into fortifying your Mac device, including misconceptions and long-held beliefs that just aren’t quite true or simply do not fit in with the modern-day computing environment.

The topic of choice this time around? Updating your macOS – more specifically – the incorrect belief that Mac (and Apple devices, et al.) don’t need updates, because they’re designed to be inherently safe.

May 25, 2022 by Jesus Vigo

2022 Verizon Data Breach Investigations Report Summary

Marking its fifteenth year, Verizon’s Data Breach Investigations Report analyzes data breach demographics spread across multiple industry verticals, providing results based on breach cases and incidents reviewed. The data gleaned from its analysis provides organizations insight into what threat types are driving attacks and how trends play a significant role over time in security. Additional guidance is provided based on quantifiable data from industry leaders, such as Jamf. Verizon also includes security recommendations, indicators of compromise and next steps to take after a breach has been identified, from very small businesses to large enterprises.

May 19, 2022 by Cristiana Pana

Jamf is ISO 27701 certified - but what does that mean?

Jamf is officially ISO 27701 certified! We are committed to improving global privacy programs, complying with global privacy standards and safeguarding data to help you meet your compliance needs. But let’s go back to basics first…

May 16, 2022 by Jesus Vigo

A History of VPN: Past, Present and Future

Secure connectivity has always been a cornerstone of endpoint security. Enterprise VPN, the long-ruling king of securing communications, faces new challenges that the aging protocol has trouble addressing – both effectively and efficiently – in modern-era computing environments.

In this blog, we discuss:

  • The dawn of VPN
  • What concerns it addressed
  • New challenges and security threats
  • How ZTNA handles legacy & current issues
Browse Blog
by Category:
Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.