Jamf Blog

1984 more articles are waiting for you.

June 6, 2023 by Jesus Vigo

Apple WWDC’23: Day one recap

An overview of the new operating systems, features and mind-blowing technology that was announced on day one of Apple’s World Wide Developers Conference (WWDC) 2023.

June 6, 2023 by Mignon Wagner

What is the Jamf Trust app?

The Jamf Trust app — a part of your Jamf Protect, Jamf Connect or Jamf Safe Internet deployment — gives employees and end users access to the tools they need while keeping their devices secure.

June 2, 2023 by Hannah Hamilton

Jamf Breakfast Club: Top 5 ways digital signage reinforces students safety and wellbeing

In this episode of the Jamf Breakfast Club, Jamf co-hosts Mike Lawrence and Nick Morawiecki are joined by guests Amber Ward, Marketing Director at Carousel Digital Signage, and Ashley Northrup, National Certified School Psychologist to discuss how Jamf and Carousel reinforce social/emotional learning in schools

June 1, 2023 by Armin Briegel

Use Swift with the Jamf API, Part 6: Putting it all together

In the final installment of the Use Swift with the Jamf API series, this blog will walk through how to put the app's UI together.

May 30, 2023 by Jesus Vigo

Top security challenges and how to overcome them: Budgetary constraints + demonstrating ROI

Not all security challenges come in the form of threat actors that seek to directly (or indirectly) compromise devices, users and data. In fact, among the most challenging and downright frustrating concerns are those that stem from risks that are not addressed due to budgetary matters minimizing an organization's ability to effectively protect its resources. The inability to demonstrate the true value gleaned from security controls through traditional ROI protocols is just as difficult and similarly frustrating…but it doesn’t have to be.

May 26, 2023 by Jesus Vigo

Top security challenges and how to overcome them: Prepare for & address external threats

Cyber threats come from all sides. As bad actors continue to evolve their toolsets to more succinctly attack targets, organizations are faced with the challenges of preparing for threats while implementing mitigations to address them as quickly and efficiently as possible. One of the most critical are external threats originating from outside the organization – proving to be amongst the most common threat types and the most difficult to protect against – but not impossible to address with a holistic, comprehensive security strategy.

May 25, 2023 by Hannah Hamilton

5 things you need to know about BYOD security

Considering a BYOD program? In this blog, we’ll discuss a few ways BYOD affects your organization's security posture.

May 23, 2023 by Laurie Mona

Can you use AI for IT scripting?

As Artificial Intelligence (AI) continues to make inroads into the workplace, our webinar explores if advanced chatbot technology belongs in the IT admin toolbox when it comes to writing useful shell scripts.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.