Jamf Blog

Posts in the Security Category

April 13, 2023 by Jesus Vigo

Top security challenges and how to overcome them: Employee training

Discover the top challenges affecting organizations when it comes to training employees on cybersecurity threats, including implementing an ongoing program that comprehensively addresses risks to endpoints, users and data. All while providing the key information necessary to empower stakeholders to identify and respond to potential attacks accordingly and to overcome the challenges of maintaining data security in the face of evolving threats.

April 11, 2023 by Jesus Vigo

Detecting Insider Threats

Media reports of external attacks that lead to data breaches are a common occurrence these days. But just as devastating to an organization are internal attacks, stemming from insider threats that often go unnoticed until it's too late. Learn about these types of threats, how to spot the signs and what solutions are available to detect and protect against them.

April 3, 2023 by Hannah Hamilton

What is advanced threat protection?

Advanced persistent threats are targeted and complex cyber attacks that can hide in your system for long periods of times. Defending against them can be tricky—read this blog to find out where to start with ATP cybersecurity.

March 31, 2023 by Jamf Threat Labs

3CX Supply-chain attack

Newly discovered supply-chain attack affecting 3CX softphone app used by millions of users globally. In this blog, the Jamf Threat Labs discusses how the app was compromised, what it does and how to go about detecting it on your network.

March 31, 2023 by Jesus Vigo

Top security challenges and how to overcome them: Compliance regulations

Discover the top challenges affecting IT and Security teams when it comes to successfully handling regulatory compliance, including assessing risks to endpoints and processes, implementing frameworks to best harden devices and overcoming the challenges of maintaining cyber security compliance by securely sharing telemetry data and developing automated workflows.

March 30, 2023 by Jamf Threat Labs

MacStealer malware: A growing threat to macOS users

MacStealer has been discovered and linked to a threat actor distributing it in the wild. The malicious code extracts a variety of files, browser cookies, and login information from a victim's system. Also, it collects end-user privacy and sensitive data, like credit card information from popular web browsers. Learn more about this new macOS malware variant and how Jamf Protect safeguards your devices, users and data from this emerging threat.

March 28, 2023 by Jesus Vigo

Security Report 360: A primer

Dive into the findings from the Jamf Threat Labs teams regarding threats impacting devices used in the modern workplace. Including supporting data on how the modern threat landscape continues to evolve as bad actors adapt their attacks when targeting sensitive data and user privacy data, as well.

In this blog we briefly discuss the top 5 trends for 2023:

  • Social engineering
  • User privacy
  • Novel threats
  • Compliance
  • Workforce distribution
March 24, 2023 by Haddayr Copley-Woods

What is Mobile Application Management (MAM)?

BYOD devices must be usable, secure, and private. And to meet all of these requirements, Apple administrators cannot depend on Mobile Application Management (MAM) alone. They need Apple-first Mobile Device Management (MDM) and endpoint protection purpose-built for Apple.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.