Jamf Blog

1984 more articles are waiting for you.

April 7, 2023 by Laurie Mona

Jamf After Dark: An update on Jamf in Healthcare

Our Jamf After Dark co-hosts Kat Garbis and Sean Rabbitt welcome the Jamf Healthcare team to the podcast to discuss Jamf’s growth in the space, the need for innovative solutions, emerging security efforts, and what to expect at HIMSS 2023.

April 6, 2023 by Sean Smith

Discover a better way to BYOD.

Privacy and security are the cornerstones of successful Bring Your Own Device (BYOD) programs: privacy for the employee, and security for the organization. It’s critical for IT departments to ensure both.

April 4, 2023 by Jesus Vigo

Using Apple Configurator 2 with Apple Business Manager

Learn about how to manually prepare stubborn devices with Apple Configurator 2 and also how to add them to Apple Business Manager for greater flexibility when enrolling them into your preferred MDM solution or when deploying special use cases.

April 3, 2023 by Hannah Hamilton

What is advanced threat protection?

Advanced persistent threats are targeted and complex cyber attacks that can hide in your system for long periods of times. Defending against them can be tricky—read this blog to find out where to start with ATP cybersecurity.

March 31, 2023 by Jamf Threat Labs

3CX Supply-chain attack

Newly discovered supply-chain attack affecting 3CX softphone app used by millions of users globally. In this blog, the Jamf Threat Labs discusses how the app was compromised, what it does and how to go about detecting it on your network.

March 31, 2023 by Jesus Vigo

Top security challenges and how to overcome them: Compliance regulations

Discover the top challenges affecting IT and Security teams when it comes to successfully handling regulatory compliance, including assessing risks to endpoints and processes, implementing frameworks to best harden devices and overcoming the challenges of maintaining cyber security compliance by securely sharing telemetry data and developing automated workflows.

March 30, 2023 by Jamf Threat Labs

MacStealer malware: A growing threat to macOS users

MacStealer has been discovered and linked to a threat actor distributing it in the wild. The malicious code extracts a variety of files, browser cookies, and login information from a victim's system. Also, it collects end-user privacy and sensitive data, like credit card information from popular web browsers. Learn more about this new macOS malware variant and how Jamf Protect safeguards your devices, users and data from this emerging threat.

March 30, 2023 by Hannah Hamilton

Jamf Security Lounge: Employee security awareness training in defense against cyber threats

Aaron Webb of Jamf and Tue Saltofte Lund and Michael Lundgaard of CyberPilot discuss the importance and implementation of cybersecurity awarness training programs.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.