Security | Jamf Blog https://www.jamf.com/blog/category/security/ The latest Security blog posts from Jamf en 2024-11-21T14:00:00+00:00 What is Vulnerability Prioritization? https://www.jamf.com/blog/vulnerability-prioritization-guide-for-it-experts/ https://www.jamf.com/blog/vulnerability-prioritization-guide-for-it-experts/ Learn about prioritizing vulnerabilities, why it’s critical and what are the key factors that influence vulnerability prioritization in the enterprise.

]]>
2024-11-21T14:00:00+00:00
What is advanced threat protection (ATP)? https://www.jamf.com/blog/what-is-advanced-threat-protection/ https://www.jamf.com/blog/what-is-advanced-threat-protection/

Advanced persistent threats are targeted and complex cyber attacks that can hide in your system for long periods of times. Defending against them can be tricky — read this blog to find out where to start with ATP cybersecurity.

]]>
2024-11-19T15:08:00+00:00
Anatomy of an Attack: Atomic Stealer malware https://www.jamf.com/blog/anatomy-of-an-attack-learn-more/ https://www.jamf.com/blog/anatomy-of-an-attack-learn-more/ Learn about the cyber kill chain and how to use it to learn more about the threats and threat actors targeting your enterprise. Also, Jamf Threat Labs takes you on a deep dive into the anatomy of an attack, dissecting each phase of an attack by the Atomic Stealer malware.

]]>
2024-11-14T14:00:00+00:00
What is endpoint hardening? https://www.jamf.com/blog/endpoint-hardening-best-practices/ https://www.jamf.com/blog/endpoint-hardening-best-practices/ Learn about endpoint hardening: what it is, its benefits and best practices.

]]>
2024-11-12T15:00:00+00:00
APT Actors Embed Malware within macOS Flutter Applications https://www.jamf.com/blog/jamf-threat-labs-apt-actors-embed-malware-within-macos-flutter-applications/ https://www.jamf.com/blog/jamf-threat-labs-apt-actors-embed-malware-within-macos-flutter-applications/ Jamf Threat Labs discovered malware samples believed to be tied to the Democratic People's Republic of Korea (DPRK), aka North Korea, that are built using Flutter, which by design provides obfuscation to the malicious code. JTL performs a deep dive into how the malicious code works to help protect users on macOS devices.

]]>
2024-11-12T13:00:00+00:00
Modern authentication: an overview https://www.jamf.com/blog/modern-authentication-explained/ https://www.jamf.com/blog/modern-authentication-explained/ Learn about modern authentication and what technologies define it. Discover how it helps organizations defend against sophisticated threats while allowing users to stay productive.

]]>
2024-11-10T14:00:00+00:00
Endpoint security best practices https://www.jamf.com/blog/endpoint-security-best-practices/ https://www.jamf.com/blog/endpoint-security-best-practices/ Start your endpoint security journey with some best practices.

]]>
2024-11-08T15:00:00+00:00
OS upgrades, security and Apple Intelligence https://www.jamf.com/blog/os-upgrades-apple-intelligence-security/ https://www.jamf.com/blog/os-upgrades-apple-intelligence-security/ It’s an old saying: the most secure software is up-to-date software. But it is also true. By using the latest version of software, you will improve the security posture of your users, devices and entire IT infrastructure. This blog highlights how upgrading your Apple operating systems across your devices creates a more secure organization.

]]>
2024-10-31T19:54:00+00:00
Jamf After Dark: get to know Jamf Threat Labs https://www.jamf.com/blog/jamf-after-dark-get-to-know-jamf-threat-labs/ https://www.jamf.com/blog/jamf-after-dark-get-to-know-jamf-threat-labs/ Get an inside look at Jamf Threat Labs in this episode of Jamf After Dark.

]]>
2024-10-31T14:15:00+00:00
Why Apple Intelligence and Private Cloud Compute are so different and secure https://www.jamf.com/blog/apple-intelligence-private-cloud-compute-explained/ https://www.jamf.com/blog/apple-intelligence-private-cloud-compute-explained/ Learn about the security and privacy controls in Apple Intelligence and how Apple’s revolutionary approach to designing the Private Cloud Compute infrastructure sets it apart from AI models hosted in cloud-based environments. Furthermore, understand how Apple succeeds where others are subject to common data security vulnerabilities and user privacy risks.

]]>
2024-10-30T16:45:00+00:00
Back to security basics: phishing https://www.jamf.com/blog/signs-youve-been-fished/ https://www.jamf.com/blog/signs-youve-been-fished/

Phishing is responsible for the majority of cyber attacks, affecting users and organizations financially and personally. In this blog, we go back to the basics of what phishing is, what an attack looks like and what steps can be taken to prevent falling victim to phishing attacks.

]]>
2024-10-22T13:00:00+00:00
Endpoint security with Chrome Enterprise and Jamf https://www.jamf.com/blog/chrome-enterprise-jamf-endpoint-security/ https://www.jamf.com/blog/chrome-enterprise-jamf-endpoint-security/ Learn about how Chrome Enterprise and Jamf can work together to create a new endpoint security standard.

]]>
2024-10-08T20:00:00+00:00
How to keep your CISO happy with IT during security audits https://www.jamf.com/blog/macos-security-compliance-tools-jamf-pro-audit-guide-jnuc-2024/ https://www.jamf.com/blog/macos-security-compliance-tools-jamf-pro-audit-guide-jnuc-2024/ Learn how to meet endpoint security compliance with Jamf and partners. Generate data that an auditor wants to see, and an audit that your CIO can be proud of.

]]>
2024-10-04T19:30:00+00:00
What is Mobile Security? Understanding Mobile Device Security https://www.jamf.com/blog/what-is-mobile-security/ https://www.jamf.com/blog/what-is-mobile-security/

Securing your mobile fleet, while sharing many similarities with desktop computers, may vary vastly depending on variables specific only to mobile technology. Mobile security requires nuanced approaches to prevent threats specifically targeting smartphones, tablets and mobile computers (laptops), and their users.

]]>
2024-09-11T13:00:00+00:00
Integrate Jamf with Okta for true continuous conditional access https://www.jamf.com/blog/okta-identity-threat-protection/ https://www.jamf.com/blog/okta-identity-threat-protection/

Last October, Okta announced that Jamf is a launch partner for Identity Threat Protection with Okta AI: their newest identity threat solution. What does this partnership accomplish? What does this mean for your organization? Read on to learn more about identity protection.

]]>
2024-08-22T14:00:00+00:00
Comprehensive Guide to Vulnerability Management for Security Professionals https://www.jamf.com/blog/vulnerability-management-guide/ https://www.jamf.com/blog/vulnerability-management-guide/ 2024-08-20T14:00:00+00:00 Cybersecurity protection with Jamf Safe Internet https://www.jamf.com/blog/cyber-security-for-schools-jamf-safe-internet/ https://www.jamf.com/blog/cyber-security-for-schools-jamf-safe-internet/ Schools are common targets of cyber attacks, resulting in lost money, student data and learning time. Learn how web threat prevention in Jamf Safe Internet can keep schools secure.

]]>
2024-08-16T13:54:00+00:00
What is Privilege Escalation? https://www.jamf.com/blog/apple-privilege-escalation-security-guide/ https://www.jamf.com/blog/apple-privilege-escalation-security-guide/ Privilege Escalation enables unauthorized access to sensitive systems, placing confidential data at risk. Learn why organizations must mitigate this critical vulnerability and what strategies are effective in keeping endpoints protected.

]]>
2024-08-08T14:00:00+00:00
Addressing mobile security needs https://www.jamf.com/blog/addressing-mobile-security-needs/ https://www.jamf.com/blog/addressing-mobile-security-needs/

Learn about the mobile security landscape and how to manage and secure your organization's mobile devices.

]]>
2024-07-17T14:02:00+00:00
Cybersecurity in education: FCC pilot program and Jamf https://www.jamf.com/blog/school-cyber-security-support-with-jamf/ https://www.jamf.com/blog/school-cyber-security-support-with-jamf/ Learn about the U.S. Federal Communication Commission's (FCC) three-year pilot program intended to enhance cybersecurity in K-12 schools.

]]>
2024-07-02T16:46:00+00:00
Defense-in-depth: Integrated security approach for enterprise https://www.jamf.com/blog/defense-in-depth-integrated-security-approach-for-enterprise/ https://www.jamf.com/blog/defense-in-depth-integrated-security-approach-for-enterprise/ Closing security gaps requires a holistic solution. Keeping enterprise resources compliant and safe from sophisticated threats takes an integrated, layered approach, that provides native support for device and OS types while prioritizing efficacy and efficiency to drive organizational ROI.

]]>
2024-06-20T14:00:00+00:00
Essentials of enterprise identity management https://www.jamf.com/blog/enterprise-identity-management-from-scratch/ https://www.jamf.com/blog/enterprise-identity-management-from-scratch/ Security, efficiency and a great user experience can all be yours with enterprise identity management tools and practices.

]]>
2024-06-17T13:00:00+00:00
WWDC 2024 Highlights: Key Takeaways for IT Admins and Security Professionals https://www.jamf.com/blog/wwdc-2024-highlights-it-security-key-takeaways/ https://www.jamf.com/blog/wwdc-2024-highlights-it-security-key-takeaways/ At WWDC 2024, Apple unveiled a suite of updates across its platforms. This year, Apple re-iterated its focus on privacy, user experience and seamless integration within its ecosystem. Apple also introduced Apple Intelligence, which will deliver major enhancements across all platforms.

]]>
2024-06-13T19:40:00+00:00
Defense-in-depth: Effective, layered security https://www.jamf.com/blog/defense-in-depth-layered-security-strategies/ https://www.jamf.com/blog/defense-in-depth-layered-security-strategies/ Modern threats are complex. If complexity is the enemy of security, then defense-in-depth is the answer to keeping your infrastructure protected by closing gaps in security and mitigating sophisticated threats.

]]>
2024-06-07T18:00:00+00:00
Artificial intelligence: standards and regulations https://www.jamf.com/blog/ai-regulations-eu-artificial-intelligence-act/ https://www.jamf.com/blog/ai-regulations-eu-artificial-intelligence-act/

Artificial intelligence is a growing technology used in many aspects of our lives. Learn how governments are regulating and developing AI frameworks to encourage responsible AI development.

]]>
2024-06-07T14:00:00+00:00
Apple device and app compliance in aviation https://www.jamf.com/blog/apple-device-app-compliance-aviation/ https://www.jamf.com/blog/apple-device-app-compliance-aviation/ Learn how Apple devices and mobile device management simplify work for employees in aviation.

]]>
2024-06-06T14:00:00+00:00
Making sense of mobile security: requirements, considerations and strategies https://www.jamf.com/blog/mobile-security-strategies/ https://www.jamf.com/blog/mobile-security-strategies/

Join Michael Covington, VP of Portfolio Strategy at Jamf, to learn about the threats that remote workers face and how to defend against them.

]]>
2024-06-05T15:50:00+00:00
Balancing privacy and security in education: Jamf webinar https://www.jamf.com/blog/balancing-security-privacy-education/ https://www.jamf.com/blog/balancing-security-privacy-education/ This webinar for school Apple administrators shows innovative ways of maintaining school security standards without putting student data or privacy at risk.

]]>
2024-06-05T13:00:00+00:00
Phishing for credentials: iOS pop-up deception through sideloaded apps https://www.jamf.com/blog/phishing-for-credentials-ios-pop-up-deception-through-sideloaded-apps/ https://www.jamf.com/blog/phishing-for-credentials-ios-pop-up-deception-through-sideloaded-apps/

In this blog, Jamf Threat Labs showcases how malicious actors deceive users. By mimicking authentic Apple pop-up messages in the native iOS style, a false sense of security is created, prompting users to instinctively input their credentials.

]]>
2024-05-30T14:00:00+00:00
5 challenges of digital workspace management and how to overcome them https://www.jamf.com/blog/5-digital-workspace-security-challenges/ https://www.jamf.com/blog/5-digital-workspace-security-challenges/

There are five notable challenges in DWM whose overarching theme boils down to just one: It’s security…but on multiple levels. Learn more about each of these challenges and how they contribute to your security posture, and what organizations can do to address them effectively.

]]>
2024-05-23T14:00:00+00:00
RSA Conference 2024: A fusion of awards, innovation and industry recognition https://www.jamf.com/blog/jamf-wins-security-awards-rsac-2024/ https://www.jamf.com/blog/jamf-wins-security-awards-rsac-2024/

Jamf triumphs at RSA Conference 2024, winning three prestigious Cyber Defense Magazine awards. Through engaging sessions and partnerships with industry leaders, Jamf reaffirmed its leadership in Apple ecosystem management and security, signaling a commitment to driving innovation and shaping a secure modern workplace.

]]>
2024-05-10T16:31:00+00:00
Defense-in-depth: One size does not fit all https://www.jamf.com/blog/secure-macos-endpoints-strategies/ https://www.jamf.com/blog/secure-macos-endpoints-strategies/

Defense-in-depth security strategies are the key to protecting your enterprise against the modern threat landscape. Continue learning more about closing gaps in security by identifying risks and mitigating them holistically.

]]>
2024-05-09T14:00:00+00:00
Introducing Microsoft Copilot for Security with Jamf https://www.jamf.com/blog/microsoft-copilot-for-security-jamf/ https://www.jamf.com/blog/microsoft-copilot-for-security-jamf/

Learn what Microsoft Copilot for Security is, how you can leverage Jamf management and security, and what it means when tools and expertise combine to make your devices much more secure.

]]>
2024-05-06T14:00:00+00:00
Maximizing ROI in security investments: The financial advantages of integrated solutions https://www.jamf.com/blog/return-on-security-investment-with-jamf/ https://www.jamf.com/blog/return-on-security-investment-with-jamf/

Is your security solution worth it? Learn how to calculate and maximize your security return on investment.

]]>
2024-05-01T14:00:00+00:00
Jamf named CVE Numbering Authority https://www.jamf.com/blog/jamf-named-cve-numbering-authority/ https://www.jamf.com/blog/jamf-named-cve-numbering-authority/

Jamf has been authorized by the Common Vulnerabilities and Exposures (CVE) program as a CVE Numbering Authority! Learn more about the CVE program and what this means for Jamf.

]]>
2024-04-30T20:26:00+00:00
Defense-in-depth: Understanding and adapting security for the modern threat landscape https://www.jamf.com/blog/defense-in-depth-understanding-and-adapting-security-for-the-modern-threat-landscape/ https://www.jamf.com/blog/defense-in-depth-understanding-and-adapting-security-for-the-modern-threat-landscape/

Learn more about closing gaps in security by integrating and layering solutions.

]]>
2024-04-25T14:00:00+00:00
Choosing the right IT security partner: How Jamf fulfills your IT security need https://www.jamf.com/blog/enterprise-it-security-solution-jamf/ https://www.jamf.com/blog/enterprise-it-security-solution-jamf/

Learn how choosing the right partner for your security needs can veritably make or break your cybersecurity plan. Also, gain a better understanding of how Jamf solutions integrate to address the challenges of the modern threat landscape through Trusted Access for top-to-bottom and end-to-end protection of your enterprise.

]]>
2024-04-17T14:00:00+00:00
Mitigate mercenary spyware attacks for iPhone with Jamf Executive Threat Protection https://www.jamf.com/blog/mitigate-spyware-jamf-executive-threat-protection/ https://www.jamf.com/blog/mitigate-spyware-jamf-executive-threat-protection/

Explore a comprehensive mobile security strategy that defends against the most sophisticated attacks impacting users.

]]>
2024-04-12T16:42:00+00:00
What is threat detection? https://www.jamf.com/blog/what-is-threat-detection/ https://www.jamf.com/blog/what-is-threat-detection/

Threats of all kinds put our cybersecurity in danger. Learn about common threat types and how to detect them.

]]>
2024-04-12T15:00:00+00:00
Jamf Connect feature: Limit Application Access for Unmanaged Devices https://www.jamf.com/blog/jamf-limits-unmanaged-device-app-access/ https://www.jamf.com/blog/jamf-limits-unmanaged-device-app-access/

Strengthening mobile security is critical. Especially for unmanaged devices that lack the management, identity and security controls of managed endpoints. In this blog, learn how Jamf Connect’s newest feature adds a layer of security to protect against unauthorized access and data breaches.

]]>
2024-04-08T14:00:00+00:00
Infostealers continue to pose threat to macOS users https://www.jamf.com/blog/infostealers-pose-threat-to-macos/ https://www.jamf.com/blog/infostealers-pose-threat-to-macos/

Jamf Threat Labs dissects ongoing infostealer attacks targeting macOS users. Each with different means of compromising the victim’s Macs but with similar aims: to steal sensitive user data.

]]>
2024-04-05T15:40:00+00:00
What is endpoint security? https://www.jamf.com/blog/what-is-endpoint-security/ https://www.jamf.com/blog/what-is-endpoint-security/

Keeping your endpoints secure is necessary for data protection. Learn what endpoint security is, what it defends against and tools to use for endpoint protection.

]]>
2024-04-03T14:00:00+00:00
A guide to understanding Advanced Endpoint Protection https://www.jamf.com/blog/a-guide-to-understanding-advanced-endpoint-protection/ https://www.jamf.com/blog/a-guide-to-understanding-advanced-endpoint-protection/

Learn about Advanced Endpoint Protection, what it is and how its integrated features contribute to a defense-in-depth security strategy that strengthens device and organizational security postures.

]]>
2024-03-29T14:00:00+00:00
End-user computing considerations and challenges https://www.jamf.com/blog/end-user-computing-explained/ https://www.jamf.com/blog/end-user-computing-explained/

In this blog, learn about end-user computing (EUC), as we define what EUC is, discuss what to consider and explain some challenges to implementing it in your enterprise.

]]>
2024-03-26T14:00:00+00:00
Zero Trust vs Least Privilege https://www.jamf.com/blog/zero-trust-vs-least-privilege/ https://www.jamf.com/blog/zero-trust-vs-least-privilege/

Zero Trust and the principle of least privilege are components of an enterprises’s security plan that can sometimes be confounded. In this blog, we define both and explain how they work in detail.

]]>
2024-03-22T14:00:00+00:00
Navigating the complex world of IT security: how unified security simplifies protection https://www.jamf.com/blog/how-unified-security-simplifies-it-protection/ https://www.jamf.com/blog/how-unified-security-simplifies-it-protection/

Securing your organization is a difficult task. Choosing the right software solutions can help. Learn how a unified security platform makes security easier.

]]>
2024-03-20T13:38:00+00:00
Introducing privilege elevation in Jamf Connect https://www.jamf.com/blog/privilege-elevation-macos-security/ https://www.jamf.com/blog/privilege-elevation-macos-security/

Learn about how privilege elevation, a new feature of Jamf Connect, helps organizations balance the end user’s needs with administrative oversight without compromising device or credential security while permitting IT and Security teams to “work smarter, not harder”.

]]>
2024-03-18T19:00:00+00:00
Data residency and security reporting in Jamf Safe Internet https://www.jamf.com/blog/data-residency-jamf-safe-internet/ https://www.jamf.com/blog/data-residency-jamf-safe-internet/

Data residency and security reporting have come to Jamf Safe Internet! Read this blog to learn what this means for educational customers and how to configure privacy settings that help admins use student data effectively.

]]>
2024-03-18T15:41:00+00:00
Zero trust network architecture best practices https://www.jamf.com/blog/discover-ztna-best-practises-from-scratch/ https://www.jamf.com/blog/discover-ztna-best-practises-from-scratch/

Zero trust helps organizations secure their company resources, even from outside the network perimeter. Learn what zero trust is, why your organization needs it and about Zero Trust Network Access.

]]>
2024-03-15T14:00:00+00:00
What is threat prevention? https://www.jamf.com/blog/understanding-threat-prevention/ https://www.jamf.com/blog/understanding-threat-prevention/

Attackers are always threatening your cybersecurity. Read this blog to learn what threat prevention is, some types of threats and how to defend against them.

]]>
2024-03-13T14:00:00+00:00