Jamf Blog

2097 more articles are waiting for you.

November 15, 2024 by Haddayr Copley-Woods

Apple Mobile Device Management FAQ: your top questions answered

The world of Apple Mobile Device Management (MDM) can sometimes raise questions. Here are some of the most frequently asked questions, some answers, and some suggestions for further reading.

November 14, 2024 by Jesus Vigo

Anatomy of an Attack: Atomic Stealer malware

Learn about the cyber kill chain and how to use it to learn more about the threats and threat actors targeting your enterprise. Also, Jamf Threat Labs takes you on a deep dive into the anatomy of an attack, dissecting each phase of an attack by the Atomic Stealer malware.

November 12, 2024 by Hannah Bien

Meet Self Service+

Learn about Self Service+ and join the beta!

November 12, 2024 by Hannah Bien

What is endpoint hardening?

Learn about endpoint hardening: what it is, its benefits and best practices.

November 12, 2024 by Jamf Threat Labs

APT Actors Embed Malware within macOS Flutter Applications

Jamf Threat Labs discovered malware samples believed to be tied to the Democratic People's Republic of Korea (DPRK), aka North Korea, that are built using Flutter, which by design provides obfuscation to the malicious code. JTL performs a deep dive into how the malicious code works to help protect users on macOS devices.

November 10, 2024 by Jesus Vigo

Modern authentication: an overview

Learn about modern authentication and what technologies define it. Discover how it helps organizations defend against sophisticated threats while allowing users to stay productive.

November 8, 2024 by Hannah Bien

Endpoint security best practices

Start your endpoint security journey with some best practices.

November 7, 2024 by Haddayr Copley-Woods

3 benefits of adopting declarative device management today

Declarative Device Management (DDM) is the future of modern device management. But what can you do with it today?

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.