Jamf Blog

Posts in the Technical Papers Category

May 2, 2025 by Jesus Vigo

Protecting vulnerable mobile endpoints. Manage and secure.

Learn how to protect vulnerable mobile devices with holistic strategies that balance management and security for comprehensive, enterprise-grade endpoint protection.

March 6, 2024 by Jesus Vigo

Crisis Control: Close security gaps with incident response and recovery

Risk vectors can be mitigated and attack surfaces hardened against threats. But security gaps happen. With a robust incident response and recovery plan, gaps can be minimized so that known threats are prevented and unknown threats can be detected proactively before they can become something worse.

May 25, 2022 by Jesus Vigo

2022 Verizon Data Breach Investigations Report Summary

Marking its fifteenth year, Verizon’s Data Breach Investigations Report analyzes data breach demographics spread across multiple industry verticals, providing results based on breach cases and incidents reviewed. The data gleaned from its analysis provides organizations insight into what threat types are driving attacks and how trends play a significant role over time in security. Additional guidance is provided based on quantifiable data from industry leaders, such as Jamf. Verizon also includes security recommendations, indicators of compromise and next steps to take after a breach has been identified, from very small businesses to large enterprises.

Scripting basics for everyone

This step-by-step guide, based on Bill Smith's popular Scripting 101 for Apple Admins webinar, is written specifically for beginners.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.