<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title>Jamf Blog</title> <link>https://www.jamf.com/blog/</link> <atom:link href="https://www.jamf.com/blog/rss/" rel="self" type="application/rss+xml" /> <description>The latest blog posts from Jamf</description> <dc:language>en</dc:language> <dc:date>2026-05-01T19:39:00+00:00</dc:date> <item> <title>Introducing the redesigned Mac threat prevention. Now available in beta.&amp;nbsp;</title> <link>https://www.jamf.com/blog/jamf-mac-threat-prevention-unified-security-macos/</link> <guid>https://www.jamf.com/blog/jamf-mac-threat-prevention-unified-security-macos/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/jamf-mac-threat-prevention-unified-security-macos.webp?q=80&w=800" alt=""><br>        <p>The beta release of Mac threat prevention simplifies how Jamf admins can defend their Mac fleets. </p> ]]> </description> <dc:date>2026-04-29T19:02:00+00:00</dc:date> </item> <item> <title>Why Mac security updates take too long and how to fix it</title> <link>https://www.jamf.com/blog/mac-security-updates-ddm-patching/</link> <guid>https://www.jamf.com/blog/mac-security-updates-ddm-patching/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/pexels-moritz-kindler-1981732-3605247.jpg?q=80&w=800" alt=""><br>    <p>Mac security updates lag due to legacy workflows. DDM enables faster patching, reducing vulnerability windows and manual effort for IT teams.</p> ]]> </description> <dc:date>2026-04-27T20:06:00+00:00</dc:date> </item> <item> <title>20 years of Jamf Training: Empowering IT professionals to succeed with Apple</title> <link>https://www.jamf.com/blog/jamf-training-20-years-apple-it-education-certification/</link> <guid>https://www.jamf.com/blog/jamf-training-20-years-apple-it-education-certification/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/jamf-training-20-years-apple-it-education-certification.webp?q=80&w=800" alt=""><br>        <p>Jamf Training marks 20 years of empowering IT professionals with hands-on learning, certifications, and evolving pathways to manage and secure Apple.</p> ]]> </description> <dc:date>2026-04-23T19:29:00+00:00</dc:date> </item> <item> <title>Balancing safety and learning: managing risky content in K&#45;12</title> <link>https://www.jamf.com/blog/k-12-content-filtering-device-level-controls/</link> <guid>https://www.jamf.com/blog/k-12-content-filtering-device-level-controls/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/k12-content-filtering.webp?q=80&w=800" alt=""><br>    <p>Discover how granular, device-level content filtering gives K-12 IT teams the precision to protect students everywhere without blocking the tools teachers depend on.</p> ]]> </description> <dc:date>2026-04-22T16:08:00+00:00</dc:date> </item> <item> <title>Three lessons from DarkSword: inside a government&#45;grade iPhone exploit kit</title> <link>https://www.jamf.com/blog/darksword-ios-exploit-kit-three-lessons-mobile-security/</link> <guid>https://www.jamf.com/blog/darksword-ios-exploit-kit-three-lessons-mobile-security/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/jtl-darksword.webp?q=80&w=800" alt=""><br>                            <p>Jamf Threat Labs analyzes leaked source code of a Safari exploitation kit (DarkSword) and the impact of this disclosure on the mobile ecosystem. </p> ]]> </description> <dc:date>2026-04-20T19:06:00+00:00</dc:date> </item> <item> <title>Introducing Bring Your Own Key (BYOK) for enhanced cloud security</title> <link>https://www.jamf.com/blog/bring-your-own-key-byok-encryption-jamf-cloud/</link> <guid>https://www.jamf.com/blog/bring-your-own-key-byok-encryption-jamf-cloud/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/introducing-byok.webp?q=80&w=800" alt=""><br>    <p>Jamf's new Bring Your Own Key (BYOK) feature gives organizations in regulated industries complete control over their encryption keys to protect sensitive data across Jamf Pro and cloud-hosted services.</p> ]]> </description> <dc:date>2026-04-16T15:09:00+00:00</dc:date> </item> <item> <title>Dedicated Internet Gateway: Safely and securely route network traffic</title> <link>https://www.jamf.com/blog/dedicated-internet-gateway-zero-trust-jamf-ztna/</link> <guid>https://www.jamf.com/blog/dedicated-internet-gateway-zero-trust-jamf-ztna/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/pexels-john-tekeridis-21837-249538.jpg?q=80&w=800" alt=""><br>    <p>Introducing Dedicated Internet Gateway, a better way to route traffic. Available with Jamf for Mac and Jamf for Mobile.</p> ]]> </description> <dc:date>2026-04-14T20:14:00+00:00</dc:date> </item> <item> <title>Automation that saves IT time: what small teams should prioritize</title> <link>https://www.jamf.com/blog/automation-small-it-teams-mac-management/</link> <guid>https://www.jamf.com/blog/automation-small-it-teams-mac-management/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/pexels-pavel-danilyuk-8439069.jpg?q=80&w=800" alt=""><br>    <p>Automation helps small IT teams reduce manual work, improve consistency, strengthen security and support growing Apple fleets without adding headcount.</p> ]]> </description> <dc:date>2026-04-14T19:46:00+00:00</dc:date> </item> <item> <title>Platform Authentication Across Jamf: A Year of Progress</title> <link>https://www.jamf.com/blog/platform-authentication-across-jamf/</link> <guid>https://www.jamf.com/blog/platform-authentication-across-jamf/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/GettyImages-2216302894.jpg?q=80&w=800" alt=""><br>      <p>When we introduced blueprints to Jamf Pro and Jamf School, we introduced more than a feature. It's Jamf's approach to delivering declarative device management (DDM) capabilities — and how we'll continue to ship new ones as Apple's framework evolves.</p> ]]> </description> <dc:date>2026-04-14T12:13:00+00:00</dc:date> </item> <item> <title>Maximizing employee productivity on Apple devices</title> <link>https://www.jamf.com/blog/maximizing-employee-productivity-on-apple/</link> <guid>https://www.jamf.com/blog/maximizing-employee-productivity-on-apple/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/maximizing-employee-productivity-on-apple.webp?q=80&w=800" alt=""><br>        <p>It's possible to improve employee experience and productivity without compromising control. Learn how to reduce downtime, empower users and keep devices secure and compliant. </p> ]]> </description> <dc:date>2026-04-14T00:43:00+00:00</dc:date> </item> <item> <title>MacBook Neo and Apple Business: expanding the entry point for Mac in the enterprise </title> <link>https://www.jamf.com/blog/macbook-neo-enterprise-mac-business-jamf/</link> <guid>https://www.jamf.com/blog/macbook-neo-enterprise-mac-business-jamf/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/macbook-neo-enterprise.webp?q=80&w=800" alt=""><br>    <p>MacBook Neo lowers the cost barrier to Mac adoption, creating a clear path from first device to enterprise scale. Learn how to start your Mac deployment with Apple tools and discover how to grow with Jamf.</p> ]]> </description> <dc:date>2026-04-13T14:53:00+00:00</dc:date> </item> <item> <title>Inside Predator&#8217;s kernel engine</title> <link>https://www.jamf.com/blog/predator-spyware-ios-kernel-exploitation-engine/</link> <guid>https://www.jamf.com/blog/predator-spyware-ios-kernel-exploitation-engine/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/jtl-predator-kernel.webp?q=80&w=800" alt=""><br>                                  <p>Commercial spyware defeats Apple's pointer authentication and achieves kernel memory access. Jamf Threat Labs investigates.</p> ]]> </description> <dc:date>2026-04-08T19:44:00+00:00</dc:date> </item> <item> <title>RSA Conference 2026 recap: AI security, enterprise mobile security and the shift to connected security platforms</title> <link>https://www.jamf.com/blog/rsa-conference-2026-recap-ai-security-enterprise-mobile-mac/</link> <guid>https://www.jamf.com/blog/rsa-conference-2026-recap-ai-security-enterprise-mobile-mac/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/rsac-2026-jamfs.webp?q=80&w=800" alt=""><br>        <p>RSA Conference 2026 highlighted how AI is reshaping security operations and introducing new risks while Mac and mobile adoption continues to accelerate in the enterprise — reinforcing the need for connected, identity-driven security platforms. Find out more.</p> ]]> </description> <dc:date>2026-04-07T14:29:00+00:00</dc:date> </item> <item> <title>Introducing the Jamf 140 Course</title> <link>https://www.jamf.com/blog/jamf-140-course-k12-apple-device-management-certification/</link> <guid>https://www.jamf.com/blog/jamf-140-course-k12-apple-device-management-certification/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/jamf-140-course-k12-apple-device-management-certification.webp?q=80&w=800" alt=""><br>      <p>The free, self-paced Jamf 140 Course builds foundational skills to manage, secure and deploy Apple devices in K-12 environments.</p> ]]> </description> <dc:date>2026-04-07T00:08:00+00:00</dc:date> </item> <item> <title>ClickFix technique uses Script Editor instead of Terminal on macOS</title> <link>https://www.jamf.com/blog/clickfix-macos-script-editor-atomic-stealer/</link> <guid>https://www.jamf.com/blog/clickfix-macos-script-editor-atomic-stealer/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/script-editor-jtl.webp?q=80&w=800" alt=""><br>                   <p>Jamf Threat Labs discovered a ClickFix-style macOS attack that abuses the applescript:// URL scheme to launch Script Editor and deliver an Atomic Stealer infostealer payload — bypassing Terminal entirely.</p> ]]> </description> <dc:date>2026-04-02T20:13:00+00:00</dc:date> </item> <item> <title>Why Mac configurations fall out of sync — and how to fix them</title> <link>https://www.jamf.com/blog/consistent-device-settings-for-company-growth/</link> <guid>https://www.jamf.com/blog/consistent-device-settings-for-company-growth/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/mac-configs-out-of-sync.webp?q=80&w=800" alt=""><br>     <p>Practical guidance for small IT teams with limited time and resources about how to consistently maintain, secure and update devices without adding to IT workloads. </p> ]]> </description> <dc:date>2026-03-30T22:46:00+00:00</dc:date> </item> <item> <title>Jamf After Dark: mobile forensics</title> <link>https://www.jamf.com/blog/mobile-forensics-closing-mobile-security-gap/</link> <guid>https://www.jamf.com/blog/mobile-forensics-closing-mobile-security-gap/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2024/jamf-after-dark.webp?q=80&w=800" alt=""><br>     <p>Jamf After Dark discusses how mobile forensics gives organizations actionable insight into advanced threats to close critical security gaps in modern enterprises.</p> ]]> </description> <dc:date>2026-03-30T20:16:00+00:00</dc:date> </item> <item> <title>AI Assistant expands into security and adds key management capabilities</title> <link>https://www.jamf.com/blog/jamf-ai-assistant-apple-device-management-security/</link> <guid>https://www.jamf.com/blog/jamf-ai-assistant-apple-device-management-security/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/GettyImages-2234742747_(1).jpg?q=80&w=800" alt=""><br>    <p>Discover how AI Assistant enhances Apple device management and security with real-time insights, compliance checks and intelligent alert analysis.</p> ]]> </description> <dc:date>2026-03-30T16:01:00+00:00</dc:date> </item> <item> <title>G2 names Jamf in its 2026 Best Software Awards across three categories</title> <link>https://www.jamf.com/blog/jamf-g2-award/</link> <guid>https://www.jamf.com/blog/jamf-g2-award/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/jamf-g2-award.webp?q=80&w=800" alt=""><br>    <p>G2 has recognized Jamf across three categories in its 2026 Best Software Awards: Enterprise, Security and IT Management.</p> ]]> </description> <dc:date>2026-03-27T21:55:00+00:00</dc:date> </item> <item> <title>Empowering Mac users: How Jamf Self Service+ reduces tier one support overhead for enterprise IT teams</title> <link>https://www.jamf.com/blog/jamf-self-service-plus-reduces-help-desk-tickets/</link> <guid>https://www.jamf.com/blog/jamf-self-service-plus-reduces-help-desk-tickets/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/2026/jamf-self-service-plus-reduces-help-desk-tickets.webp?q=80&w=800" alt=""><br>    <p>Self Service+ reduces tickets by enabling secure self service, improving productivity and freeing IT for higher-value work.</p> ]]> </description> <dc:date>2026-03-26T19:39:00+00:00</dc:date> </item> <item> <title>HIMSS 2026 recap</title> <link>https://www.jamf.com/blog/himss-2026-recap/</link> <guid>https://www.jamf.com/blog/himss-2026-recap/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/what-happened-at-HIMSS-2026.webp?q=80&w=800" alt=""><br>       <p>Discover what healthcare's brightest minds are building toward in this HIMSS 2026 recap.</p> ]]> </description> <dc:date>2026-03-25T20:28:00+00:00</dc:date> </item> <item> <title>Introducing Beacon by Jamf Threat Labs</title> <link>https://www.jamf.com/blog/beacon-jamf-threat-labs-mac-threat-hunting-service/</link> <guid>https://www.jamf.com/blog/beacon-jamf-threat-labs-mac-threat-hunting-service/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/beacon-jtl.webp?q=80&w=800" alt=""><br>    <p>Get expert advice and Mac-specific threat intelligence with Beacon by Jamf Threat Labs.</p> ]]> </description> <dc:date>2026-03-25T16:59:00+00:00</dc:date> </item> <item> <title>Why the Jamf platform is the natural foundation for MSPs</title> <link>https://www.jamf.com/blog/apple-first-msp-platform-jamf/</link> <guid>https://www.jamf.com/blog/apple-first-msp-platform-jamf/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/jamf-for-msp.webp?q=80&w=800" alt=""><br>    <p>Jamf's Apple-first MSP platform empowers managed service providers to build scalable, profitable Apple practices by leveraging native Apple technologies — including Declarative Device Management and Apple network relay — rather than retrofitting Windows-era tools onto macOS.</p> ]]> </description> <dc:date>2026-03-20T15:31:00+00:00</dc:date> </item> <item> <title>GhostClaw expands beyond npm: GitHub repositories and AI workflows deliver macOS infostealer</title> <link>https://www.jamf.com/blog/ghostclaw-ghostloader-malware-github-repositories-ai-workflows/</link> <guid>https://www.jamf.com/blog/ghostclaw-ghostloader-malware-github-repositories-ai-workflows/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/ghostclaw-ghostloader-malware-github-repositories-ai-workflows.webp?q=80&w=800" alt=""><br>                               <p>Jamf Threat Labs details how the GhostClaw malware campaign uses GitHub repositories and AI-assisted development workflows to deliver credential-stealing payloads on macOS.</p> ]]> </description> <dc:date>2026-03-18T19:45:00+00:00</dc:date> </item> <item> <title>Android and Jamf: manage and secure your mobile fleet</title> <link>https://www.jamf.com/blog/android-enterprise-management-managed-google-accounts-jamf/</link> <guid>https://www.jamf.com/blog/android-enterprise-management-managed-google-accounts-jamf/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/android-and-jamf-manage-and-secure-your-mobile-fleet.webp?q=80&w=800" alt=""><br>    <p>Learn how Jamf can help you fully manage your entire mobile device fleet.</p> ]]> </description> <dc:date>2026-03-17T17:01:00+00:00</dc:date> </item> <item> <title>Social engineering in K&#45;12 for beginners</title> <link>https://www.jamf.com/blog/social-engineering-in-k-12-schools-how-to-defend-against-cyber-attacks/</link> <guid>https://www.jamf.com/blog/social-engineering-in-k-12-schools-how-to-defend-against-cyber-attacks/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/social-engineering-k12.webp?q=80&w=800" alt=""><br>      <p>K-12 schools are frequent targets for social engineering attacks due to inexperienced users and limited resources. Learn what social engineering is, how it shows up in school environments, and how a combination of user education and security tools can help protect students, teachers and IT teams.</p> ]]> </description> <dc:date>2026-03-16T22:32:00+00:00</dc:date> </item> <item> <title>Jamf Nation Live 2026: Hands&#45;On Apple Expertise Across Six Cities</title> <link>https://www.jamf.com/blog/jamf-nation-live-announcements/</link> <guid>https://www.jamf.com/blog/jamf-nation-live-announcements/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/jnl-2026-blog.webp?q=80&w=800" alt=""><br>    <p>Jamf Nation Live (JNL) returns in 2026, bringing hands-on learning, practical workflows and vibrant community connections to six cities across the U.S. </p> ]]> </description> <dc:date>2026-03-09T16:21:00+00:00</dc:date> </item> <item> <title>Developer Mode&#45;as&#45;a&#45;Defense: How iOS Security Features Deter Nation&#45;State Spyware</title> <link>https://www.jamf.com/blog/how-developer-mode-stops-ios-spyware/</link> <guid>https://www.jamf.com/blog/how-developer-mode-stops-ios-spyware/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/pexels-thisisengineering-3861958.jpg?q=80&w=800" alt=""><br>          <p>Discover how combining Jamf Mobile Forensics with Developer Mode creates an environment that sophisticated malware is engineered to avoid.</p> ]]> </description> <dc:date>2026-03-06T20:11:00+00:00</dc:date> </item> <item> <title>Stop chasing passwords: how school IT can reduce reset tickets</title> <link>https://www.jamf.com/blog/stop-chasing-passwords-how-school-it-can-reduce-reset-tickets/</link> <guid>https://www.jamf.com/blog/stop-chasing-passwords-how-school-it-can-reduce-reset-tickets/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/stop-chasing-passwords.webp?q=80&w=800" alt=""><br>    <p>An overload of password reset tickets isn't random. It's the predictable result of fragmented access. </p> ]]> </description> <dc:date>2026-03-06T19:56:00+00:00</dc:date> </item> <item> <title>Privacy by default, flexible when required: introducing limited privacy in Jamf Safe Internet</title> <link>https://www.jamf.com/blog/jamf-safe-internet-limited-privacy-student-safety-privacy-balance/</link> <guid>https://www.jamf.com/blog/jamf-safe-internet-limited-privacy-student-safety-privacy-balance/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/products/devices-with-jamf-jamf-safe-internet.png?q=80&w=800" alt=""><br>    <p>Online safety is foundational. See how Jamf offers online safety with flexible controls, enabling districts to safeguard students while customizing protections to meet growing needs.</p> ]]> </description> <dc:date>2026-03-04T17:55:00+00:00</dc:date> </item> <item> <title>What a lower&#45;cost MacBook Neo means for education</title> <link>https://www.jamf.com/blog/macbook-neo-education-pricing-apple-classroom-accessibility/</link> <guid>https://www.jamf.com/blog/macbook-neo-education-pricing-apple-classroom-accessibility/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/macbook-neo.webp?q=80&w=800" alt=""><br>      <p>Apple's new MacBook Neo brings Mac's creative power to more classrooms with education-friendly pricing that makes advanced learning experiences accessible to budget-conscious schools. Learn more.</p> ]]> </description> <dc:date>2026-03-04T16:27:00+00:00</dc:date> </item> <item> <title>From arrival to discharge: how iOS is reimagining the healthcare journey</title> <link>https://www.jamf.com/blog/jamf-at-himss-2026/</link> <guid>https://www.jamf.com/blog/jamf-at-himss-2026/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/jamf-at-HIMSS-2026.webp?q=80&w=800" alt=""><br>    <p>Jamf will be at HIMSS 2026 this year from March 9-12 in Las Vegas, Nevada, presenting at booth #1144. Enjoy this preview of what we'll have to offer!</p> ]]> </description> <dc:date>2026-02-26T19:59:00+00:00</dc:date> </item> <item> <title>Federated Identity Management for K&#45;12 Education</title> <link>https://www.jamf.com/blog/federated-identity-in-k-12/</link> <guid>https://www.jamf.com/blog/federated-identity-in-k-12/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/federated-identity-in-k-12.webp?q=80&w=800" alt=""><br>    <p>Learn how identity federation modernizes IT workflows while streamlining and securing stakeholder experiences for K-12 institutions of all sizes.</p> ]]> </description> <dc:date>2026-02-26T19:26:00+00:00</dc:date> </item> <item> <title>Where Apple Meets the Enterprise: Jamf’s Interoperability Advantage for Secure, Automated Access Control</title> <link>https://www.jamf.com/blog/device-based-access-control-apple-enterprise-security/</link> <guid>https://www.jamf.com/blog/device-based-access-control-apple-enterprise-security/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/2025/why-Jamf-for-Mac-vanity.jpg?q=80&w=800" alt=""><br>    <p>Device-based access controls strengthen security by ensuring only compliant Apple devices can access sensitive enterprise resources.</p> ]]> </description> <dc:date>2026-02-20T13:49:00+00:00</dc:date> </item> <item> <title>Simplify access, secure your apps: why SSO matters for K&#45;12</title> <link>https://www.jamf.com/blog/single-sign-on-schools-simplify-access-strengthen-security/</link> <guid>https://www.jamf.com/blog/single-sign-on-schools-simplify-access-strengthen-security/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/sso-k12.webp?q=80&w=800" alt=""><br>    <p>Managing dozens of app logins creates password chaos for students and security headaches for IT, but single sign-on (SSO) can help. By centralizing identities and automating access policies, schools can reduce IT workload, strengthen security and let students focus on learning instead of remembering passwords.</p> ]]> </description> <dc:date>2026-02-17T20:26:00+00:00</dc:date> </item> <item> <title>Identity and access management in K&#45;12 schools</title> <link>https://www.jamf.com/blog/identity-and-access-management-in-k-12-schools/</link> <guid>https://www.jamf.com/blog/identity-and-access-management-in-k-12-schools/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/iam-k12.webp?q=80&w=800" alt=""><br>    <p>Identity and Access Management (IAM) enhances the learning experience for students, teachers and IT admins alike. Our beginner's guide walks through what IAM could look like for your K-12 school.</p> ]]> </description> <dc:date>2026-02-10T14:32:00+00:00</dc:date> </item> <item> <title>OpenClaw: the helpful AI that could quietly become your biggest insider threat</title> <link>https://www.jamf.com/blog/openclaw-ai-agent-insider-threat-analysis/</link> <guid>https://www.jamf.com/blog/openclaw-ai-agent-insider-threat-analysis/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/openclaw-jtl.webp?q=80&w=800" alt=""><br>          <p>OpenClaw offers powerful automation, but without proper security oversight, it can pose real risk. Read the latest from Jamf Threat Labs.</p> ]]> </description> <dc:date>2026-02-06T14:34:00+00:00</dc:date> </item> <item> <title>Get Started with Scripting Series: macOS Terminal, Scripting and Jamf Pro API</title> <link>https://www.jamf.com/blog/jamf-online-training-updates/</link> <guid>https://www.jamf.com/blog/jamf-online-training-updates/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/get-started-scripting-series-blog.webp?q=80&w=800" alt=""><br>        <p>See the latest update to Jamf's Get Started with Scripting series. Read on to learn more.</p> ]]> </description> <dc:date>2026-02-04T19:38:00+00:00</dc:date> </item> <item> <title>Managing Apple devices at Black Hat Europe with Jamf</title> <link>https://www.jamf.com/blog/managing-apple-devices-black-hat-europe-with-jamf/</link> <guid>https://www.jamf.com/blog/managing-apple-devices-black-hat-europe-with-jamf/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/black-hat-europe.webp?q=80&w=800" alt=""><br>        <p>This year, Jamf became the official Device Management and Security partner for the Black Hat Network Operations Center (NOC), managing and securing every Apple device powering the event, from backstage infrastructure to front-line operations.</p> ]]> </description> <dc:date>2026-01-29T18:13:00+00:00</dc:date> </item> <item> <title>Scaling device deployments without scaling your IT team</title> <link>https://www.jamf.com/blog/scaling-device-deployments-without-scaling-it-team/</link> <guid>https://www.jamf.com/blog/scaling-device-deployments-without-scaling-it-team/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/scaling-device-deployments-without-scaling-it-team.webp?q=80&w=800" alt=""><br>    <p>Learn why repeatable, automated deployment models help K-12 IT teams scale device programs without increasing headcount or operational strain.</p> ]]> </description> <dc:date>2026-01-28T20:42:00+00:00</dc:date> </item> <item> <title>How Predator spyware defeats iOS recording indicators</title> <link>https://www.jamf.com/blog/predator-spyware-ios-recording-indicator-bypass-analysis/</link> <guid>https://www.jamf.com/blog/predator-spyware-ios-recording-indicator-bypass-analysis/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/jtl-predator-indicators.webp?q=80&w=800" alt=""><br>                             <p>Jamf Threat Labs analyzes how a commercial spyware sample (Predator) operates post-compromise.</p> ]]> </description> <dc:date>2026-01-27T19:21:00+00:00</dc:date> </item> <item> <title>Making Mac work in a PC world</title> <link>https://www.jamf.com/blog/making-mac-work-in-a-pc-world/</link> <guid>https://www.jamf.com/blog/making-mac-work-in-a-pc-world/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/making-mac-work-in-a-pc-world.webp?q=80&w=800" alt=""><br>    <p>Discover how Mac interoperability eliminates manual IT workflows, reduces risk and improves productivity at PC-dominated enterprise organizations. </p> ]]> </description> <dc:date>2026-01-27T07:15:00+00:00</dc:date> </item> <item> <title>The hidden costs of manual device provisioning</title> <link>https://www.jamf.com/blog/overcoming-k12-manual-device-provisioning-hidden-costs/</link> <guid>https://www.jamf.com/blog/overcoming-k12-manual-device-provisioning-hidden-costs/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/overcoming-k12-manual-device-provisioning-hidden-costs.webp?q=80&w=800" alt=""><br>    <p>Manual provisioning seems simple, but hidden costs add up in time, inconsistency and classroom disruption. Discover how zero-touch deployments restore readiness and efficiency.</p> ]]> </description> <dc:date>2026-01-23T02:32:00+00:00</dc:date> </item> <item> <title>Threat Actors Expand Abuse of Microsoft Visual Studio Code</title> <link>https://www.jamf.com/blog/threat-actors-expand-abuse-of-visual-studio-code/</link> <guid>https://www.jamf.com/blog/threat-actors-expand-abuse-of-visual-studio-code/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/jtl-DPRK.webp?q=80&w=800" alt=""><br>                       <p>Jamf Threat Labs identifies additional abuse of Visual Studio Code. See the latest evolution in the Contagious Interview campaign.</p> ]]> </description> <dc:date>2026-01-19T00:41:00+00:00</dc:date> </item> <item> <title>Mac management and security for lean IT teams</title> <link>https://www.jamf.com/blog/mac-management-security-lean-it-teams/</link> <guid>https://www.jamf.com/blog/mac-management-security-lean-it-teams/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/mac-management-security-lean-it-teams.png?q=80&w=800" alt=""><br>    <p>Discover how our e-book, Mac Management and Security for Growing Businesses helps mid-market organizations manage Apple devices with automation, fewer tickets and holistically-aligned security workflows.</p> ]]> </description> <dc:date>2026-01-15T22:19:00+00:00</dc:date> </item> <item> <title>Automated certificate management and device security integration</title> <link>https://www.jamf.com/blog/digicert-jamf-automated-certificate-management/</link> <guid>https://www.jamf.com/blog/digicert-jamf-automated-certificate-management/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/tech-partner-spotlight-digicert.webp?q=80&w=800" alt=""><br>     <p>DigiCert and Jamf automate certificate lifecycle management to reduce outages, improve compliance and enable secure, passwordless access across Apple and hybrid environments.</p> ]]> </description> <dc:date>2026-01-13T19:31:00+00:00</dc:date> </item> <item> <title>The hidden risks in your mobile apps</title> <link>https://www.jamf.com/blog/mobile-app-security-risks/</link> <guid>https://www.jamf.com/blog/mobile-app-security-risks/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/mobile-app-security-risks.webp?q=80&w=800" alt=""><br>              <p>With nearly one in six mobile apps containing known vulnerabilities and two-thirds using weak encryption, organizations need to find ways to protect their data and maintain security in an increasingly mobile-first workplace. Learn more.</p> ]]> </description> <dc:date>2026-01-08T22:30:00+00:00</dc:date> </item> <item> <title>&#8220;Mac in 2026: Secure by Design Meets the Enterprise&#8221; webinar</title> <link>https://www.jamf.com/blog/mac-in-2026-secure-by-design-meets-the-enterprise-webinar/</link> <guid>https://www.jamf.com/blog/mac-in-2026-secure-by-design-meets-the-enterprise-webinar/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2025/mac-in-2026-secure-by-design-meets-the-enterprise-webinar.webp?q=80&w=800" alt=""><br>    <p>Watch this webinar to discover why Mac is emerging as the most secure, Zero Trust–ready productivity endpoint for the modern enterprise. </p> ]]> </description> <dc:date>2026-01-05T22:43:00+00:00</dc:date> </item> <item> <title>Jamf named a Unified Endpoint Management leader&#8230;again!</title> <link>https://www.jamf.com/blog/why-idc-names-jamf-a-apple-first-uem-leader/</link> <guid>https://www.jamf.com/blog/why-idc-names-jamf-a-apple-first-uem-leader/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/2025/idc-marketplace.png?q=80&w=800" alt=""><br>    <p>IDC MarketScape has positioned Jamf in the Leaders Category for Worldwide Unified Endpoint Management Software for Apple Devices 2025-2026 Vendor Assessment (Doc #US53003225, Dec 2025).</p> ]]> </description> <dc:date>2026-01-05T20:04:00+00:00</dc:date> </item> <item> <title>Jamf recognized as a Leader in 2026 Gartner® Magic Quadrant™ for Endpoint Management Tools</title> <link>https://www.jamf.com/blog/jamf-leader-gartner-magic-quadrant-endpoint-management-2026/</link> <guid>https://www.jamf.com/blog/jamf-leader-gartner-magic-quadrant-endpoint-management-2026/</guid> <description> <![CDATA[   <img src="https://media.jamf.com/images/news/2026/jamf-gartner-26.webp?q=80&w=800" alt=""><br>     <p>Jamf earned Leader status in the 2026 Gartner Magic Quadrant for Endpoint Management Tools by delivering what customers need most: unified Apple-first simplicity, intelligent automation that scales, and security that's built in, not bolted on. Learn more in this blog post.</p> ]]> </description> <dc:date>2026-01-05T19:43:00+00:00</dc:date> </item> </channel> </rss>