Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

JumpCloud

Featured Post

Building a Modern Identity Capability to Tackle DORA

Hackers are quickly taking advantage of every vulnerability in an organisation's armoury, particularly exploiting poorly managed identities. An organisation might have the strongest firewalls, encryption, anti-malware, vulnerability scanners, and risk management tools in the world, but if identities are not managed securely, this still leaves one critical gap in its cybersecurity arsenal.

JumpCloud Announces Its First Free Virtual Conference for IT Professionals

JumpCloud Inc. has opened registration for JumpCloudLand, its first-ever user conference taking place on 28th January 2025. JumpCloudLand is a free virtual event for IT professionals. It offers everything IT teams need to build skills, stay ahead of industry trends, and unlock opportunities for professional and organisational growth. Attendees will have the chance to meet industry leaders, exchange ideas with peers, and discover innovative ways to drive success for their teams and businesses.

What is Software-as-a-Service (SaaS) Operations?

In this video, learn the following key points about Software-as-a-Service Operations (SaaS Ops): Resources and social media: Transcript: Organizations rely on SaaS applications more and more to get things done. But with so many specialized apps and different vendors, IT departments can get lost in the cloud. It’s easy to see why -- most organizations use over 100 SaaS apps in their day-to-day tasks. For an IT team, that’s a ton to manage.

What is UPnP? And Why is it Still a Security Risk?

In this video, learn what UPnP is, what it does, use cases, why it's a security risk, and security measures you can take. Learn more about: Resources and social media: Transcript: Universal Plug and Play, or UPnP, is a way for all devices on a local network to discover and connect with each other automatically, rather than having to connect each device by manually entering protocols like TCP/IP, HTTP, or DHCP.

What Are Hardware and Software Keyloggers? How Can You Spot and Prevent Them?

In this video, learn what hardware and software keyloggers are, signs you may have one, how to prevent them, and more. Learn more about: Resources and social media: Transcript: Do you remember every key you pressed on your laptop today? Every word you typed in an email? Every password you punched in? Every digit you entered for your credit card? For you and me, recalling all that information is next to impossible. But not for a Keylogger.
Featured Post

Is the Speed of AI Development Leaving UK SMEs Struggling to Plug Security Gaps?

Artificial Intelligence (AI) is perhaps one of the fastest evolving technologies in business today. For SMEs, it can be hard to keep up with these developments and sift through what's simply noise, and what will deliver tangible business benefits. As the UK data from our recent SME IT Trends report shows, embracing AI can help UK SMEs streamline operations, improve the admin and user experience, and stand out in a crowded marketplace. Without a doubt, choosing to ignore AI would be choosing to fall behind.

What Is ARM64 and Why Should You Use It?

In this video, learn what ARM64 is, its architecture, its advantages over x86 and other processors, and other general benefits. Resources and social media: Transcript: If you’re wondering what ARM64 is, let’s flash back a few years… During the 2000s, ARM processors led the way in the mobile revolution, providing our smartphones and tablets with serious computing power. ARM’s 32-bit chips were built on reduced instruction set computer (RISC) architecture that clocked speeds of 1 to 2 GHz, and became the dominant chip inside the devices we put in our pockets.

The IT Hour | macOS Keychain Protection & Fall Releases 09.27.24

Tom Bridge is back to tell us about macOS Keychain Protection & Fall Releases. Join us at 11:30 am ET The #IT Hour hosted by #JumpCloud is a #communityprogram focused on the life of #ITAdministrators. With the ever changing #ITlandscape, having community and professional networking opportunities is very valuable.