Zero Trust Network Access for Beginners

According to Gartner, Zero Trust Network Access (ZTNA) is a product or service that creates an identity- and context-based, logical access boundary around an application or set of applications. ZTNA is the successor to Virtual Private Networkin…

Security 360: Annual Trends Report

Each year, Jamf  Threat Labs analyzes the threats impacting devices used in the modern workplace. This year’s report looks at five key security trends impacting real organizations with users that are connecting remotely to a multitude of app…

Phishing Trends Report 2021

In 2021, phishing has infiltrated every form of communication, from work and personal e-mail to SMS, social media, and even advertising. Why? Because it’s easier for an attacker to exploit a person and capture data via a phishing attack than it i…

A Cloud Architecture Checklist

In many ways, it has simplified software architecture and practices, however, it has also complicated them. Successful cloud architectures must take into account resilience to faults, resilience to attack, scalability and maintainability. There are key…

A Cloud Architecture Checklist

In many ways, it has simplified software architecture and practices, however, it has also complicated them. Successful cloud architectures must take into account resilience to faults, resilience to attack, scalability and maintainability. There are key…