Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloud

The IT Hour | Mobile Device Trust 06.28.24

Sergey Belous, Principal Product Manager joins us to announce the highly anticipated Mobile Device Trust! Join us at 11:30 am ET The #IT Hour hosted by #JumpCloud is a #communityprogram focused on the life of #ITAdministrators. With the ever changing #ITlandscape, having community and professional networking opportunities is very valuable. You can expect from our weekly conversations.

How to Enhance Ubuntu Security: Advanced Features and Techniques

Jump to Tutorial Ubuntu, a popular Linux distribution, is known for its robust security features. There is always space for improvement once you install a fresh operating system, so in this article, we will guide you through the advanced techniques and features to enhance the security of the latest Ubuntu 24.04 version. There are multiple layers of security that Ubuntu offers out of the box, but we can implement additional steps that can further protect your system from threats.

Creating Users Manually | JumpCloud University Tutorial (2024)

In this tutorial, we will go over how to create a user in JumpCloud manually. This method can be used when you need to add a single user. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content.

Cloud Security Compliance: Ensuring Data Safety in the Cloud

Modern organizations know that protecting their data is absolutely critical. That’s where cloud security compliance comes in. Satisfying regulatory standards helps organizations protect against unauthorized access and data breaches, as well as other security incidents. Beyond protecting data, compliance also protects organizations from the legal implications and financial effects of attacks.

What Drives an SME's Approach to Implementing AI?

AI’s rise in both the business and consumer worlds has been astonishingly exponential. Businesses are using AI to generate content, analyze data, automate processes, and more. But small and medium-sized enterprises (SMEs) look and act very differently from their enterprise counterparts. This prompts the question: How are SMEs approaching AI? Recent data from a 2024 JumpCloud study of SME IT may help answer it.

Falcon Cloud Security Supports Google Cloud Run to Strengthen Serverless Application Security

We’re thrilled to share that the CrowdStrike Falcon sensor now fully supports Google Cloud Run, bringing advanced security capabilities to your serverless applications. While we announced this at Google Cloud Next in April 2024, this blog goes deeper into the integration and shares how customers leveraging Google Cloud Run and CrowdStrike can deploy Falcon quickly to enhance their serverless security requirements.

JUMPSEC Red Teaming in the cloud forecast for the future

A red teamer’s forecast – Cloudy with a chance of hacks Our adversarial simulation team will outline how attackers exploit cloud infrastructure and offer strategies to counter their efforts. Key insights involve recognising significant security risks in cloud adoption, including emerging attack vectors, comprehending hacker tactics in cloud settings, and swiftly implementing effective measures to safeguard cloud environments.

Configuring RADIUS | JumpCloud University Tutorial (2024)

In this tutorial, you'll see how to configure JumpCloud's Cloud RADIUS for your organization, Wireless or VPN networks. JumpCloud's Cloud RADIUS allows you to use either JumpCloud or Azure AD as your identity provider. Cloud RADIUS also supports Certificate Based Authentication, allowing you to bring your own certificates for Passwordless authentication. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content.