Jamf CIO: Apple will be the No. 1 enterprise endpoint by 2030

Credit to Author: Jonny Evans| Date: Thu, 16 Jun 2022 04:02:00 -0700

I spoke with Jamf CIO Linh Lam on a recent UK visit to mark the company’s 20th anniversary. The 2020 Bay Area CIO of the Year Finalist joined Jamf in 2021 – and thinks Apple will be the top enterprise endpoint by 2030 as its current momentum accelerates.

The changing landscape of enterprise IT

“The way the demand is growing and the expectations of younger generations joining the workforce, Apple devices will be the number one endpoint by 2030,” she told me.

To read this article in full, please click here

Read more

WWDC22: Apple brings declarative device management to the Mac?

Credit to Author: Jonny Evans| Date: Mon, 06 Jun 2022 08:11:00 -0700

More opportunities for engineers and developers to implement declarative device management solutions are likely to emerge at WWDC 2022, at least, according to MacAdmins.

Speaking during the pre-event podcast, speakers argue that Apple will eventually require that all mobile device management (MDM)  providers introduce support for declarative management. Might this include bringing declarative device management to the Mac?

What is declarative device management?

Apple first introduced declarative device management last year, largely for two reasons: to make devices more proactive, and to reduce the impact on MDM servers that handle large fleets of devices. This should boost performance and scalability.

To read this article in full, please click here

Read more

Enterprise mobility 2022: UEM adds user experience, AI, automation

Credit to Author: Bob Violino| Date: Tue, 03 May 2022 03:00:00 -0700

The past two years have seen mobility management take on a greater importance than ever in the enterprise. As remote and hybrid work models take hold at many organizations, “mobility management” has expanded its meaning from management of mobile devices to management of all devices used by mobile employees, wherever they happen to be working from.

Unified endpoint management (UEM) has become a strategic technology at the center of companies’ efforts to control this increasingly complex environment. Essentially combining enterprise mobility management (EMM) tools with PC management tools, UEM platforms help companies manage and protect a range of devices including smartphones, tablets, laptops, and desktop computers across multiple operating systems — all from a unified interface.

To read this article in full, please click here

Read more

Jamf adds network and endpoint security tools for enterprise Macs

Credit to Author: Jonny Evans| Date: Tue, 26 Apr 2022 07:46:00 -0700

Jamf has announced a series of significant updates to Jamf Protect, introducing a unique set of technologies designed to make enterprise devices more secure while also identifying and responding to incoming endpoint threats. The company also introduced, Jamf Trust, which aims to make this kind of security simple to use. (The latter is also available for Android and Windows.)

What’s new in Jamf Protect?

The big news for Mac security, Jamf Protect, now offers a comprehensive endpoint and network security solution, supplementing its existing protections with new tools for:

To read this article in full, please click here

Read more

Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code

Credit to Author: BrianKrebs| Date: Fri, 22 Apr 2022 13:09:39 +0000

KrebsOnSecurity recently reviewed a copy of the private chat messages between members of the LAPSUS$ cybercrime group in the week leading up to the arrest of its most active members last month. The logs show LAPSUS$ breached T-Mobile multiple times in March, stealing source code for a range of company projects. T-Mobile says no customer or government information was stolen in the intrusion. LAPSUS$ is known for stealing data and then demanding a ransom not to publish or sell it. But the leaked chats indicate this mercenary activity was of little interest to the tyrannical teenage leader of LAPSUS$, whose obsession with stealing and leaking proprietary computer source code from the world’s largest tech companies ultimately led to the group’s undoing.

Read more

Addigy talks up Apple-in-the-enterprise tech show

Credit to Author: Jonny Evans| Date: Mon, 07 Feb 2022 04:13:00 -0800

Apple’s continuing enterprise momentum means it’s grabbing a growing slice of the business ecosystem, and the expansion is driving growth across the Apple device management ecosystem.

Addigy Innovate 2022

Reflecting this, Addigy recently announced plans to hold its annual Innovate 2022 conference later this month. I spoke with Jason Dettbarn, founder and CEO, who says the event will include keynotes and product presentations, including one hosted by The Ethical Hacker author Ralph Echemendia.

To read this article in full, please click here

Read more

The Safety of Your Data On Social Media

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Fri, 29 Jun 2018 15:41:29 +0000

Trend Micro recently asked a simple question on Twitter, “Are you worried about the safety of your data when using social media?” More than 33,000 responses later and the answer is a toss up. The discussions in response to our tweet didn’t provide a clear answer either. This is despite months of high profile Facebook…

The post The Safety of Your Data On Social Media appeared first on .

Read more

Use Windows Information Protection (WIP) to help make accidental data leakage a thing of the past

Credit to Author: Microsoft Secure Blog Staff| Date: Tue, 15 May 2018 16:00:24 +0000

Have you always wished you could have mobile application management (MAM) on Windows? Now you can! Windows Information Protection (WIP) is an out-of-the box data leakage prevention feature for Windows 10 that can automatically apply protection for work files and data to prevent accidental data leakage. With 600 million active Windows 10 devices, corporate customers

Read more

Read more