
Jamf unveils AI-powered tools for Apple device security
Jamf has introduced new artificial intelligence-driven management and security features for Apple devices used in the workplace, expanding its platform with updates focused on automation, compliance, and identity management.
These advancements are designed to help organisations deploy, manage, and secure Apple devices at scale, with Jamf highlighting the platform's use of artificial intelligence to enhance IT administrators' productivity and decision-making capabilities.
Jamf's new AI Assistant comes with two newly launched features—search skill and explain skill—which are now available in beta. The search skill enables IT administrators to perform natural language inventory queries, allowing for swift identification of devices based on specific criteria. This reduces the reliance on manual filtering, helping IT teams speed up tasks such as troubleshooting, compliance auditing, and managing device fleets.
The explain skill is aimed at demystifying complex aspects of mobile device management. It translates detailed configurations and policies into clear, accessible language, which Jamf says will help administrators make informed decisions, streamline troubleshooting, and manage policies with increased confidence.
Support for Apple's evolving Declarative Device Management framework has also been enhanced through the general availability of Jamf Blueprints. This tool consolidates policies, profiles, and restrictions into a single workflow designed to simplify and expedite device configuration. By supporting nine different declaration types, Blueprints seeks to reduce the complexity involved in device setup and streamline management across Apple fleets.
As part of this release, Configuration Profiles within Blueprints have entered beta. This framework is designed to deliver all available MDM keys more quickly and efficiently, providing IT teams with greater control and flexibility over their environment.
Jamf's Self Service+, its latest end-user portal for macOS, has also received updates. First launched earlier this year, Self Service+ now offers expanded identity management features, including the ability to view account details, change passwords, and initiate workflows such as temporary admin access. All these functions are designed to be fully auditable and compliant with organisational requirements.
According to Jamf, these enhancements are designed to streamline onboarding, reduce IT involvement in routine tasks, and foster a more security-aware, self-sufficient workforce.
In response to the growing adoption of Macs in enterprise settings, Jamf has introduced new integrated security features. The Compliance Benchmarks feature is now generally available in Jamf Pro, building on the macOS Security Compliance Project. This allows IT teams to automate workflows that ensure endpoint hardening. Jamf reports that hundreds of organisations have already adopted Compliance Benchmarks to help prepare for compliance requirements and reduce security risk.
Jamf has added malware detection to its App Installers service, leveraging Jamf Threat Labs to scan every application in the Jamf App Catalogue before deployment. This layer of security is intended to enhance supply chain protections, with the supported app library now including frequently used tools such as iTerm and VLC media player, sourced directly from original software vendors.
Vulnerability management has also been expanded with enhanced reporting features designed to identify risky apps across devices, integrating with major SIEM platforms. This provides IT and information security teams with a unified view of software risks, helping to streamline organisational remediation efforts.
To improve the experience for both administrators and end users, Jamf has introduced App Switcher in Jamf Account. The tool enables administrators to navigate the platform more easily, aiming to accelerate workflows and further unify the management environment.
Looking forward, Jamf's network relay service is scheduled for release soon. This service enables Macs and mobile devices to securely access essential services during onboarding, eliminating the need for traditional VPN or zero-trust network access solutions. According to Jamf, this capability is designed to give IT teams full control over initial network connectivity and facilitate a seamless, secure onboarding process for users.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Techday NZ
2 hours ago
- Techday NZ
World's largest data breach exposes 16 billion credentials
The scale of the latest data breach, involving a staggering 16 billion new credentials and passwords, is forcing both experts and organisations to reckon with the ongoing weaknesses in global digital security. Described as the world's largest data breach, the incident has reportedly swept up data from a vast array of online platforms, including not only commercial giants like Apple and Google but also government services and numerous SaaS (Software as a Service) applications. Brian Soby, co-founder and CTO at AppOmni, whose company specialises in securing digital records, believes the breach was inevitable given the industry's reliance on outmoded security frameworks. Soby warns that the gravity of the situation goes beyond the raw numbers: "This isn't just a collection of old, previously leaked passwords; it appears to be a new, massive, and highly organised library of credentials." According to Soby, cybercriminals now hold a "roadmap for widespread account takeovers" that threatens the backbone of modern digital life — cloud services and SaaS applications — potentially outpacing many current security defences. Soby highlights a critical vulnerability at the heart of today's enterprises. While many organisations invest in identity management and access security projects, basic misconfigurations and failure to disable outdated forms of credential use leave them exposed. "Large credential dumps such as these are likely to highlight just how many organisations indeed remain vulnerable to credential attacks due to these insufficient protections," he adds. Spencer Young, Senior Vice President EMEA at cybersecurity firm Delinea, echoes the concern, underlining that static credentials, especially passwords which are seldom changed, represent an Achilles' heel. "Passwords alone – especially unrotated ones – leave consumers and organisations vulnerable to phishing, credential stuffing, and Pass-the-Hash attacks," he notes. Young stresses that the traditional advice of strong password hygiene is no longer sufficient. Instead, initiatives like automated password rotation and credential vaulting, which reduce the window of opportunity for attackers, should be the new standard. In terms of longer-term solutions, Young observes that passwordless authentication approaches are gaining traction. "Technologies such as biometrics, where biometric data remains encrypted and safely stored in the device and does not travel across the network, improves the authentication process," he explains. However, he warns that passwords themselves are far from obsolete; they are increasingly being relegated to the background as part of a layered, multifactor authorisation system that may include one-time passwords or magic links to enhance security. With cybercriminals orchestrating campaigns using vast troves of login data, the scale of weaponisation is unprecedented. Tim Eades, CEO and co-founder at Anetac, illustrates the dilemma facing organisations across the world, as these troves become "a commodity that are bought, sold, and weaponised in countless attacks." Eades notes that the unrelenting circulation of stolen records magnifies the risk over time, especially as new AI agents — sometimes deployed without adequate safeguards — can introduce further vulnerabilities and thousands of new access points for attackers. "The part that keeps CISOs up at night? These records circulate for years, the risk doesn't go away, it only grows over time." Raising further alarm, Eades points out that until affected organisations are identified, compromised individuals may have no warning or recourse. This opacity not only endangers users but also perpetuates a cycle in which threat actors vie to surpass one another, pushing the boundaries of data breaches ever further. He urges organisations to reinforce security measures: "Leaders should protect all credentials like they are the keys to the castle." Encouraging the use of unique passwords, two-factor authentication, and embedding a culture of security awareness are presented as essential starting points. Another concern arising from the breach is the "snowball effect" it might have on cyber-attacks, especially through the proliferation of sleeper accounts. Xavier Sheikrojan, Senior Risk Intelligence Manager at Signifyd, warns that fraudsters may use stolen credentials not just for immediate exploitation but to create dormant accounts for later and larger-scale attacks. He advocates for proactive action, urging businesses to monitor user behaviour, force password resets, and continually refine machine learning systems aimed at picking up fraudulent activity. As experts across the sector agree, the exposure of billions of records simultaneously marks a pivotal moment in the digital security landscape. While technology continues to advance, so too does the capacity and sophistication of cybercrime, prompting renewed calls for organisations and individuals alike to treat identity and access security with unwavering seriousness and vigilance.


Techday NZ
3 days ago
- Techday NZ
Jamf report finds phishing & infostealers surge on Apple devices
Jamf has released its Security 360 Report, highlighting significant security trends and risks for mobile and Mac devices within organisational environments worldwide. The report, which examines both mobile and macOS platforms, identifies phishing, infostealers, and operating system vulnerabilities as major concerns and areas where enterprises need to focus their cybersecurity efforts. According to Josh Stein, Vice President of Product Strategy at Jamf, the aim of the research is to help security professionals understand and manage the challenges posed by both longstanding and emerging threats. "Our goal with this research is to inform security leaders about the risks impacting their organizations – whether those risks impact Mac or mobile – and provide tangible recommendations for safeguarding their organizations against increasingly sophisticated attacks," said Josh Stein, VP of Product Strategy at Jamf. "Age-old threats like phishing remain extremely prevalent and cannot be overlooked…nor can threats skyrocketing in popularity like infostealers. Jamf remains deeply committed to continuous threat research to not only protect our customers but also contribute valuable insights to the broader security community." Mobile threats The report notes that mobile devices are frequently the sole tools used by employees to access work resources, emphasising the need for robust defences across a variety of threat vectors. Jamf segmented its analysis of mobile device threats into four key areas: phishing, vulnerability management, application risk and malware, and spyware. Phishing attacks remain especially prevalent, with Jamf identifying approximately 10 million such attacks in the past year. The company reported that 25% of organisations experienced a social engineering incident and that one in ten users clicked on a malicious phishing link. The report suggests security training programmes and the adoption of layered, zero-trust security models can help mitigate these risks. In terms of vulnerability management, Jamf found that 32% of organisations had at least one device with critical vulnerabilities, and that 55.1% of mobile devices in use within workplaces were running on a vulnerable operating system. The company highlighted the importance of timely updates to patch known vulnerabilities, as provided by both Apple and Google. The research further discussed application risk, referencing Jamf's previous identification of a Transparency, Consent and Control (TCC) bypass flaw on iOS. The company demonstrated how side-loaded apps can compromise user privacy and emphasised the need for security controls that extend beyond just keeping operating systems up to date. Spyware and advanced malware were identified as threats that, though less frequent than on some platforms, are extremely sophisticated when they do emerge. High-profile individuals, including journalists, politicians, and diplomats, are at particular risk, with Apple sending compromise notifications to users in around 100 countries last year. The report recommends treating mobile devices with the same level of security as other endpoints in the enterprise environment. Threats to macOS Mac devices, which were once principally used by executives and creatives, have become common fixtures in enterprises across a range of sectors. According to the report, this proliferation has broadened the attack surface and increased the diversity of threats targeting the platform. Jamf outlined three principal areas of concern for macOS: application risk and malware, vulnerability management, and social engineering. Infostealers have become the dominant form of malware on Macs, accounting for 28.36% of all Mac malware analysed by Jamf, compared to just 0.25% in the previous year's findings. The report singles out employees in industries such as cryptocurrency as needing to be particularly alert, advocating for both ongoing training and adequate technological defences. The report also addresses myths about macOS security, noting that vulnerabilities persist despite perceptions of invulnerability. Jamf highlighted a recently discovered flaw in Gatekeeper, a mechanism intended to stop unverified apps from being run. The report notes the requirement for both effective technical controls and regular employee training to counter risks posed by software vulnerabilities. Social engineering threats, including phishing, exploit the widespread adoption of Macs in the workplace. Jamf cited campaigns that use professional social media platforms such as LinkedIn as initial attack vectors, rather than the email channels typically associated with phishing. The company recommends comprehensive employee training on all forms of phishing relevant to Mac users. Methodology The findings in the Security 360 Report are based on the analysis of 1.4 million devices protected by Jamf, conducted in the first quarter of 2025. The scope of analysis covered the previous year, included users in 90 countries, and spanned multiple mobile and desktop platforms, including iOS, iPadOS, Android, and macOS devices. The report draws on Jamf's proprietary Threat Intelligence, incorporating data from original research, device usage metrics, and analysis of news and external data feeds.


Techday NZ
10-06-2025
- Techday NZ
Apple unveils macOS Tahoe 26 with new design & AI features
Apple has previewed macOS Tahoe 26, the next major update to its desktop operating system, bringing a new design, enhanced Continuity features, significant Spotlight updates, and expanded Apple Intelligence capabilities. Design updates The new design introduces the Liquid Glass material, offering translucent effects that reflect and refract the surroundings. Key elements such as the Dock, sidebars, and toolbars have been refined to focus on user content, and the menu bar is now completely transparent to maximise display space. Customisation options have been expanded, allowing users to arrange controls in the menu bar and Control Centre, and apply different colours or emojis to folders and app icons. New light and dark appearances for app icons, as well as updated wallpapers and theme colours, are also included. Continuity improvements macOS Tahoe introduces the Phone app to the Mac via Continuity, allowing users to relay cellular calls from their iPhone, access Recents, Favourites, and Voicemails, and use features such as Call Screening and Hold Assist. Call Screening answers calls from unknown numbers and gathers information for the user, while Hold Assist enables users to keep their place in a queue and continue working. Live Activities from iPhone are now integrated into the Mac menu bar, displaying real-time events such as flights, rides, or sports scores. Clicking a Live Activity opens iPhone Mirroring for further details and interaction. Spotlight enhancements Spotlight receives an update with the ability to execute hundreds of actions, such as sending emails or creating notes, directly from the search interface. Search results are grouped and prioritised by relevance, with new filtering and browsing options for faster content discovery, and improved support for documents in third-party cloud drives. Spotlight now supports actions from both Apple and third-party apps via the App Intents API. Users can also run shortcuts and perform personalised actions based on routines, as well as use quick keys for rapid commands. Apple Intelligence features Apple Intelligence expands with features focused on productivity, communication, and creativity. Live Translation provides text and audio translation in real time across Messages, FaceTime, and phone calls, using on-device models to maintain privacy. Shortcuts can now leverage Apple Intelligence models for tasks such as text summarisation and automatic image creation. Shortcuts can run at designated times or upon specific actions. Users may also access ChatGPT for broader world knowledge within shortcuts. Genmoji and Image Playground receive updates allowing users to customise emoji attributes and apply various artistic styles, including those powered by ChatGPT. Reminders can now be automatically categorised and action items identified through Apple Intelligence. Gaming and developer tools The release introduces the Apple Games app, centralising games, recommendations, and social features. Game Overlay provides fast access to system settings and social actions during gameplay. The new Metal 4 framework offers advanced graphics and rendering technologies for developers. Upcoming games for Mac include titles such as Crimson Desert, InZOI, Cyberpunk 2077, and several others, utilising features like MetalFX Upscaling and support for Apple's M3 and M4 chips with ray tracing. Additional features Other updates in macOS Tahoe include refreshed Safari design and faster performance, new features in Messages such as Backgrounds, Polls, and improved group chat navigation, as well as the launch of the Journal app for Mac. Photos receives a design update with personalisation improvements, FaceTime introduces a redesigned landing page and floating controls, and Notes gains markdown compatibility and support for audio transcription from Phone app calls. Accessibility developments include Magnifier support, Accessibility Reader, enhanced Braille Access, and Vehicle Motion Cues to help reduce motion sickness. The Passwords app tracks changes and version history for users' credentials. "macOS is the heart and soul of the Mac, and with Tahoe, we're building on what users love most. Whether you're a power user or just getting started on Mac, there's something for everyone, with even more features to turbocharge productivity and make working across Mac and iPhone more seamlessly than ever before," said Craig Federighi, Apple's Senior Vice President of Software Engineering. "With its gorgeous new design, amazing Continuity experiences, powerful enhancements to Spotlight, more intelligent shortcuts, and updates to Apple Intelligence, the Mac experience is better than ever."