Latest Articles

scripts jamf tutorials

Modified JAMF Compliance Editor Extension: List failed items NOT in exemption list

macOS Compliance Project + JAMF Compliance Editor As promised I am continuing to look for ways to build out my JAMF Github Repo. One of the items that I have been working heavily with in my role is the macOS Compliance Project and as I am a JAMF administrator that means leveraging the JAMF Compliance Editor. The JAMF Compliance Editor gives you the ability to rapidly configure, tailor and deploy a custom baseline with the macOS Compliance Project. If you are new to either the macOS Compliance Project or JAMF...

scripts jamf tutorials

How to setup exemptions with JAMF Compliance Editor

Setting the stage If you are new to either the macOS Compliance Project or JAMF Compliance Editor, I would recommend watching and reading the following videos and blog posts on the topic. NIST macOS Security & JAMF Compliance Review NIST macos security How-To 2023 JNUC Presentation on JAMF Compliance Editor Lets assume for the sake of this blog post that you are familiar with both of these wonderful solutions to baseline compliance on macOS. For many who use JAMF and the macOS Compliance Project, the use of JAMF Compliance Editor,...

scripts jamf tutorials

BYOD Restrictions & Strategies for 2025

Blog Series Securing BYOD Email Access: Exploring Strategies in Microsoft 365 BYO with me in 2025: iOS with User Enrollment in JAMF Pro Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune BYOD Restrictions & Strategies for 2025 BYOD Restrictions As organizations continue to embrace Bring Your Own Device (BYOD) strategies, ensuring security without compromising user experience remains a challenge. This post outlines a minimum baseline for BYOD restrictions across iOS, Android, macOS, and Windows devices—providing a foundation for companies to secure personal devices while allowing employees the...

articles video

Reflecting on a Transformative Journey: From Entrepreneur to Cybersecurity Leader

As 2025 begins, it’s a fitting time to reflect on the transformative journey I’ve undertaken over the past few years. It’s been a whirlwind, filled with growth, learning, and exciting challenges. 2022: Closing One Chapter In 2022, I sold the company I had poured my heart and soul into for nearly a decade. For nine and a half years, I ran that business as its CEO, primary consultant, and wearer of every other hat imaginable. Growing the business and eventually selling it was a monumental achievement, but it also marked...

articles video

Good Cybersecurity policies, procedures, guidelines take time. They're not rushed and aren't rubber stamped

Cybersecurity is no longer a luxury or an afterthought—it’s an absolute necessity. But how can you tell if the company you work for, as a security professional, truly values cybersecurity? Let’s explore some clear indicators that demonstrate a company’s commitment to implementing robust security practices in-house. A company passionate about cybersecurity doesn’t treat it as a one-time project or a compliance checkbox. Instead, security is deeply embedded in their culture and operations. Organizations that take cybersecurity seriously prioritize it from the top down, with leadership advocating for and investing in...

articles video

Is it time to stop getting certified in your field?

The Struggles with Certification in the IT Industry In the IT field, certifications often appear to be the golden ticket and in many cases the fast track to success. They signal expertise, validate skills, and provide a sense of accomplishment. However, the heavy reliance on certifications in the industry brings a host of challenges, and many professionals, like myself, find themselves questioning the value, timing, and necessity of these credentials. Lets explore the psychology of certifications, the phenomenon of over-certification, and the impact on career progression, including managerial and mentorship...