macOS Trojan Surge: Enterprise EDR & Hardening Checklist
Jamf says trojans now make up half of mac detections. Use this enterprise checklist to harden Mac fleets with EDR, MDM, and allowlisting.
Jamf’s latest Security 360 findings are a wake-up call for enterprise Apple fleets: trojans now account for roughly half of macOS detections, which means the threat model for Macs has shifted from “rare and mostly opportunistic” to “routine and operational.” For IT teams, that matters because macOS malware is no longer limited to consumer-grade adware or occasional payloads delivered through obvious phishing. Today’s trojan detection workflows need to assume persistence, script abuse, credential theft, and living-off-the-land techniques that bypass weak controls. If you manage mixed fleets or remote-first endpoints, this is the moment to tighten legacy control planes, align policy with telemetry, and make sure EDR can actually see what matters.
This guide is designed as a practical hardening checklist for admins who need a deployment-ready approach, not a marketing overview. We will cover kernel-level telemetry, notarization enforcement, script controls, binary allowlists, MDM policies, and threat hunting queries that can be adapted to your EDR stack. Along the way, we’ll tie control selection to operational realities like change management, user impact, and policy drift, because strong security that breaks workflows tends to get disabled. If you are also reviewing platform architecture, the same thinking applies as in compliance automation and explainable identity controls: visibility and enforcement only work when they are auditable.
1) Why the macOS Trojan Shift Changes Enterprise Defense
Trojans exploit trust, not just vulnerabilities
A trojan usually arrives disguised as a legitimate installer, document, utility, or update prompt. On macOS, that often means abusing user trust, application execution pathways, or signed-but-untrusted software delivered outside normal acquisition channels. Because many organizations historically treated Macs as lower-risk endpoints, they often have weaker execution control than Windows endpoints: looser Gatekeeper tuning, no script restrictions, broad admin rights, and inconsistent EDR rollout. Trojans thrive in those gaps.
The key operational change is that defenders should stop asking whether Macs are “infected like Windows machines” and instead ask whether the fleet is instrumented to detect unauthorized execution, suspicious persistence, and post-exploitation behavior. That means your controls must see beyond hashes and into process ancestry, code signing context, AppleEvents abuse, LaunchAgent creation, and suspicious shell activity. If your team already thinks in terms of operational architectures, apply the same discipline here: decide what telemetry is authoritative, what is alert-worthy, and what is block-worthy before the incident happens.
Why detection rates matter more than headline names
When a report says trojans represent half of detections, the specific family names matter less than the pattern. Detection volume tells you the attack surface is broad: fake browser updates, cracked software, malicious DMG files, poisoned installers, and bundle-based payloads are still effective. In practical terms, this means your endpoint program needs to handle commodity malware at scale while preserving capacity for rare, high-signal threats such as credential harvesters or staging tools.
Enterprise security teams often over-index on threat actor brand names and under-invest in execution controls. But trojans are fundamentally an identity and policy problem: they rely on a user or process being allowed to run something it should not have been able to run in the first place. That is why hardening needs to begin with trusted software distribution, then move to script limitations, then to EDR hunting and response. A structured, layered rollout is similar to the approach described in procurement questions for enterprise software: define requirements, evaluate controls, and prove ongoing value.
What this means for IT and security operations
Security operations should plan for a rise in alerts tied to suspicious persistence mechanisms, archive extraction activity, browser hijacker behavior, and unsigned binaries launching from user-writable paths. IT should expect pressure from users to allow “needed” utilities, beta tools, or ad hoc installers; without guardrails, those exceptions become the easiest path for trojans. The right response is not blanket denial, but policy-backed allowlisting, controlled exceptions, and telemetry-based review.
In practical deployments, mature teams treat macOS like any other serious enterprise platform: they standardize build configurations, lock down administrative rights, and continuously validate that endpoint policy remains enforced after OS upgrades. Teams that already track technical debt in systems operations will recognize the pattern: every exception and one-off bypass becomes a future incident root cause unless it is documented, monitored, and revisited. The rest of this guide is about turning that philosophy into a checklist.
2) Build the Telemetry Foundation: EDR, Kernel Visibility, and OS Events
Why kernel-level telemetry still matters on macOS
macOS malware investigations are far stronger when your EDR has access to low-level process, file, network, and code-signing telemetry. Even with Apple’s platform protections, many meaningful detection opportunities show up only when you can correlate process tree behavior, launch context, and parent-child relationships over time. You want visibility into script interpreters, archive utilities, browser-spawned processes, and any binary executing from temporary or user-controlled locations.
Kernel-level telemetry is especially valuable for trojan detection because it reveals execution paths that user-facing tools miss. A trojan may arrive via a disk image, pivot into a launch agent, and then invoke shell commands or AppleScript to persist. If your EDR cannot show the entire chain, response becomes guesswork. Treat telemetry coverage like infrastructure observability in a cloud stack: if the data is incomplete, your detections will be fragile, just as explained in query observability for private cloud systems.
What to collect for reliable hunting
At minimum, collect process creation, parent process, command line, code signing status, notarization status where available, file write events for persistence locations, network connections, and privilege changes. Add quarantine attribute changes, Gatekeeper assessments, LaunchAgent/LaunchDaemon writes, shell history relevant artifacts where policy permits, and execution from common staging paths such as Downloads, /tmp, and /private/var/folders. The stronger your normalization, the easier it is to hunt across vendor stacks and correlate suspicious activity with user identity.
Do not rely on one source only. Pair EDR data with MDM inventory, file integrity signals, and, if possible, unified logging exports for high-value hosts. This matters when malware is designed to race your response window: it may self-delete, rotate filenames, or run only once per reboot. A good team also documents the expected baseline for common software, similar to the way specialized engineering lifecycles define standard stages and controls for unusual workloads.
Minimum telemetry checklist
Use this as a practical baseline for every managed Mac:
- Process creation with full parent/child lineage.
- Command-line arguments and working directory.
- Binary path, signature, team ID, and notarization result.
- LaunchAgent and LaunchDaemon creation/modification.
- Network connections, especially first-seen destinations.
- File writes to user-writable locations and persistence paths.
- Privilege escalation attempts, sudo usage, and admin group changes.
- Script execution: bash, zsh, sh, Python, Perl, AppleScript, and osascript.
Pro Tip: If your EDR can’t reliably show process ancestry and launch persistence on macOS, you do not have a trojan detection program — you have a quarantine tool.
3) Enforce Notarization, Code Signing, and Execution Trust
Notarization should be policy, not advice
Apple notarization is a key control, but many environments still treat it as optional guidance rather than a default execution gate. That is a mistake when trojans are distributed through convincing installers or repackaged applications. Notarization does not guarantee a file is safe, but it does raise the cost of casual abuse and gives defenders an additional trust signal for allowlisting decisions. Your objective is not perfect prevention; it is reducing the number of unreviewed binaries that ever reach execution.
Where operationally feasible, enforce Gatekeeper and require that untrusted binaries trigger quarantine behavior. Block or review software that is unsigned, ad hoc signed, improperly packaged, or runs from user-controlled directories. For enterprises with a formal software intake process, a consistent execution policy can dramatically reduce friction later in incident response. Teams that have already adopted content governance workflows will recognize the value of standardization: fewer exceptions mean fewer blind spots.
How to operationalize code-signing verification
Build your policy around trusted publishers, Team IDs, bundle identifiers, and hash-based validation for high-risk utilities. When a vendor release changes unexpectedly, require revalidation before the binary is admitted to the allowlist. If you distribute in-house tools, sign them consistently, keep notarization current, and document ownership so security can trace every allowed executable to a business owner.
For sensitive admin tools, consider a separate trust tier. A remote support utility, package manager, or agent installer can be legitimate and still deserve closer inspection because it has elevated reach. This is similar to the logic used in third-party GPU security clauses: trusted service does not mean uncontrolled service. The execution path should be visible, logged, and revocable.
Hardening steps for execution trust
1. Require notarized software for all standard endpoints unless a formal exception exists. 2. Reject unsigned or ad hoc signed binaries in production groups. 3. Maintain a review queue for new publishers and changed bundle IDs. 4. Log all allowlist approvals with owner, business justification, and expiration date. 5. Retire stale exceptions quarterly. These steps are simple, but they are often missing because teams assume MDM alone is enough.
When you need to explain why these controls matter to leadership, frame them as risk containment rather than “Apple purity.” The right policy lowers the probability that a trojan can look legitimate long enough to establish persistence. That is the same logic that underpins embedded compliance checks: automate the right decision at the point of risk, not after the fact.
4) Restrict Scripts, Interpreters, and Living-off-the-Land Abuse
Scripts are a preferred payload and staging layer
Modern trojans rarely stop at a single binary. They often use shell scripts, AppleScript, Python, and installer packages to stage payloads, modify persistence, or pull second-stage content from remote infrastructure. If users can run scripts freely from Downloads or mounted disk images, malware can blend into normal admin and developer behavior. That is why script control should be treated as a first-class security policy, not an afterthought.
Start by identifying where scripts are truly needed. Most users do not need unrestricted access to bash, zsh, python3, osascript, or Automator-style workflows. Developers and IT staff may need some of these tools, but their access should be scoped by group, signing trust, or managed workflow. Think of this as a least-privilege version of the broad software gating used in workflow software selection: define the business case before you grant the capability.
Controls that reduce script abuse
Use MDM to restrict which users or groups can execute high-risk interpreters, and consider per-app or per-path rules where your EDR or application control stack supports them. Block scripts launched from common staging locations unless they are signed, approved, or part of an administrator-managed package. If your stack supports it, instrument alerts on shell downloads, curl-to-shell patterns, base64 decoding, chmod +x followed by execution, and script interpreters spawned by browsers or document viewers.
Also watch for abuse of AppleScript and osascript, which attackers use to manipulate UI prompts or trigger actions in a way that appears user-driven. Similarly, archive utilities like unzip, ditto, and tar often appear in benign workflows and malicious staging workflows alike, so process context is critical. A trojan that launches a script interpreter from a browser or document helper is far more suspicious than one started from a trusted admin package path.
Practical script policy tiers
Tier 1: standard users cannot execute arbitrary scripts; only signed apps from trusted sources run. Tier 2: developers can run scripts in controlled locations with visibility and logging. Tier 3: privileged IT groups can use signed automation tooling, but every tool is inventoried and monitored. This tiered approach avoids the common mistake of applying the same restrictions to everyone, which produces workarounds and shadow IT.
For teams managing multiple operating environments, the script-control problem resembles hybrid workflow design: you need to decide where execution belongs, where it is monitored, and where it is outright blocked. Once that boundary is clear, detection quality improves because exceptions become rarer and easier to investigate.
5) Binary Allowlisting: Reduce the Attack Surface Before It Becomes an Incident
Why allowlisting is essential on macOS
Binary allowlisting is one of the strongest enterprise defenses against trojan delivery because it flips the default from “anything approved by the user can run” to “only known software can execute.” On macOS, this can be implemented through combinations of MDM restrictions, endpoint controls, package management policies, and EDR application control. A mature allowlist does not need to cover every conceivable utility on day one, but it must cover the business-critical and user-critical software that keeps the fleet productive.
Without a curated allowlist, your team ends up relying on reputation alone, which is not enough when trojans mimic common app categories or piggyback on legitimate installers. Allowlisting also gives you better incident response: when an unknown binary appears, it is easier to spot because it violates policy rather than merely looking unusual. This is the same principle behind inventory discipline in inventory playbooks and supply chain controls — you cannot protect what you do not enumerate.
How to build an effective allowlist
Start with your standard image and top software tier. Group applications by business function: browsers, collaboration suites, development tools, VPN clients, security tools, and specialty applications. For each approved binary, record the publisher, version range, signing identity, hash or certificate reference, install source, and owner. Do not approve broad wildcard rules without expiration dates, because those eventually become permanent exceptions.
Then add a review process for software updates. A common failure mode is allowing version 1.2.3 and silently admitting 1.2.4, even though the installer path or signing chain changed. Better practice is to validate each release channel with automated checks and roll forward only after testing. If your environment supports package repositories or internal software catalogs, push users toward those channels rather than direct internet downloads. That approach is similar to the disciplined sourcing logic in candidate sourcing: strong intake is more reliable than trying to fix bad inputs later.
Exception handling without losing control
Exceptions should be time-bound, owner-bound, and risk-reviewed. For example, a contractor may need a niche utility for a 30-day project. Grant it to the minimum group, log the justification, alert on execution outside the intended scope, and remove the exception automatically at expiration. If an exception becomes permanent, it should be converted into a managed software asset, not left as a one-off rule.
In mature programs, allowlisting and EDR work together. Allowlisting reduces the attack surface; EDR catches what slips through or is authorized but misused. That dual approach is much stronger than either control alone and is worth benchmarking against broader governance models such as rules-engine compliance automation.
6) MDM Policies That Actually Harden macOS Fleets
MDM is your enforcement backbone
MDM is where policy becomes real at scale. If your macOS fleet is not governed by strong MDM baselines, almost every other control becomes inconsistent. A good MDM posture should enforce OS update cadence, password and screen-lock requirements, admin privilege restrictions, recovery and escrow settings, and application control baselines. It should also track compliance drift so that devices that fall behind are visible before they become an incident.
Think of MDM as your control plane for reducing decision entropy. Instead of relying on manual ticket handling, security can set policy once and monitor whether endpoints comply. This is especially important for remote and hybrid devices where network location is no longer a reliable trust signal. Organizations already managing complex distributed systems, such as those described in interoperability playbooks, understand why central policy beats scattered exceptions.
Recommended macOS hardening policies
Require FileVault, strong local account protections, and automatic screen locking. Remove standing admin rights from standard users and use just-in-time elevation for support or IT staff. Enforce rapid OS patching for security releases, and make sure reboot deferrals are bounded. Configure Gatekeeper and quarantine settings to avoid silent acceptance of unknown software. Restrict profile installation to trusted management channels only.
Also, use MDM to reduce common trojan success paths: disable auto-execution behaviors that users do not need, limit sharing and remote administration surfaces, and prevent unmanaged browser extensions where possible. For developers and power users, offer separate managed profiles rather than one global exception set. This preserves productivity while keeping your baseline strict.
Baseline policy checklist
- FileVault enabled on all devices.
- Admin rights removed from standard user accounts.
- OS update deadlines for critical security releases.
- Screen lock timeout aligned to risk tolerance.
- Gatekeeper and quarantine enforcement verified.
- Approved app catalog for standard software.
- Device compliance reporting and automated quarantine workflows.
One useful framing is to compare MDM policy to disciplined retail categorization in product expansion management: when the catalog grows, controls need to scale with it or the whole system becomes harder to govern. The same is true for endpoint fleets.
7) Threat Hunting Queries and Investigation Priorities
High-signal hunting ideas for macOS trojans
Threat hunting should focus on behaviors that are difficult for legitimate software to mimic at scale. Look for unsigned or newly seen binaries executing from Downloads, Desktop, or temporary directories; script interpreters spawning from browsers or document viewers; LaunchAgents or LaunchDaemons created shortly after a suspicious download; and binaries connecting to rare external hosts soon after first execution. Correlate these events with user context and software inventory to separate expected admin activity from suspicious execution.
Also hunt for persistence artifacts that survive user logoff: unusual plist files, cron-like behavior, login items, and helper tools placed in writable directories. Trojans frequently try to blend into normal application support paths, so path normalization matters. If your EDR supports it, enrich with reputation and prevalence data to prioritize low-frequency binaries and unusual parent chains.
Example hunt patterns
1. Browser process spawning shell, Python, or osascript. 2. Execution from /Downloads or /private/var/folders followed by outbound network activity. 3. A signed app writing a new LaunchAgent in the user context. 4. A newly notarized binary with no internal software record. 5. Any binary whose signing status changed between environments or versions.
If you maintain your own detection library, build these as reusable analytics rather than one-off searches. The goal is to make trojan hunting a repeatable operational task, not a heroic exercise after a user reports a problem. The same discipline appears in technical learning frameworks: codify the process so it can scale with the team.
Sample triage questions for analysts
Who launched the process, and from where? Was the file downloaded, unpacked, or mounted from external media? Did the binary have a matching software inventory entry? Did it create persistence, alter login items, or invoke a script interpreter? Did it beacon to an unusual host or use DNS patterns associated with ad hoc infrastructure? Answering these questions quickly turns a vague alert into a defensible incident timeline.
For teams that want better executive reporting, translate hunt results into metrics: time-to-detect, time-to-contain, number of blocked executions, and number of policy exceptions removed. Those metrics are easier to defend in review than a raw alert count and help leadership understand the value of hardening. The same logic applies when comparing operational technologies across a portfolio, as seen in metrics-to-action planning.
8) Incident Response Workflow for Suspected macOS Trojan Activity
Containment first, but preserve evidence
If you suspect a trojan on a Mac, isolate the host immediately, but avoid wiping evidence before you capture what you need. Preserve process lists, loaded launch items, network connections, and recent file artifacts. If possible, snapshot relevant telemetry from EDR and MDM before rebooting the machine, because many trojans are designed to lose volatile evidence when killed. This is especially important if the endpoint belongs to a developer, executive, or admin account with broader access than standard users.
Containment should include credential hygiene. If the machine had access to VPNs, SSO, password managers, or privileged portals, assume tokens and browser sessions may be compromised until proven otherwise. Reset or revoke sessions as needed, and notify systems owners if service accounts or API credentials might have been exposed. The response model should be as disciplined as a business continuity plan, not a one-off cleanup task.
Eradication and recovery steps
After containment, identify persistence points, remove malicious artifacts, and validate that launch items, cron-like tasks, and installed profiles are clean. Check for unexpected browser extensions, login items, and remote access tools. Reimage if the malware affected a privileged user, altered system integrity, or triggered multiple persistence mechanisms. If the host is business critical, rebuild from a trusted baseline rather than trying to surgically remove every artifact.
Before returning the machine to service, verify EDR health, MDM enrollment, patch level, and policy compliance. Recheck the allowlist state and ensure any temporary exception used during recovery has been removed. Teams that deal with time-sensitive operations, such as payment settlement optimization, already understand that speed matters, but only if the process is controlled and measurable.
Post-incident improvements
Every incident should feed back into hardening. Was the initial vector a rogue installer, a fake update, or a user-run script? Did the EDR generate a useful signal that was ignored, or did the detection gap come from missing telemetry? Were there overbroad permissions or stale exceptions that should have been removed earlier? Those answers should drive policy updates, not sit in a report.
This closes the loop between response and prevention. The best teams do not just clean up trojans; they use each case to improve software intake, MDM policy, and analyst playbooks. That is how you move from reactive cleanup to a control system that gets better over time, much like resilient planning in tech debt management.
9) Comparison Table: Control Options for macOS Trojan Defense
Not every control has the same job. Use this comparison to decide where each layer fits in your stack and what it is best at catching.
| Control | Primary Value | Best Against | Limitations | Recommended Use |
|---|---|---|---|---|
| EDR with kernel telemetry | Deep behavioral visibility | Persistence, process chains, post-exploitation | Depends on sensor quality and tuning | Core detection and response |
| Notarization enforcement | Raises trust threshold | Unsigned and repackaged software | Does not prove benignity | Default execution control |
| Script restrictions | Reduces living-off-the-land abuse | Shell, AppleScript, Python staging | Can disrupt legitimate automation | Scoped by role and group |
| Binary allowlisting | Prevents unknown execution | Commodity trojans and unauthorized tools | Requires maintenance and exception handling | Standard and regulated environments |
| MDM hardening | Fleet-wide baseline enforcement | Drift, admin abuse, patch lag | Needs strong governance to stay current | All managed endpoints |
In most enterprises, the right answer is not picking one control and ignoring the others. A secure macOS program layers EDR visibility on top of MDM enforcement, then adds notarization, allowlisting, and script policy to reduce exposure. Think of it as a portfolio of controls, not a single silver bullet. That perspective aligns with lean staffing models: the value comes from how the pieces fit together, not from any one component alone.
10) Deployment Roadmap: A 30/60/90-Day Hardening Plan
First 30 days: visibility and inventory
Start by mapping the fleet. Confirm EDR coverage, MDM enrollment, current OS versions, admin-rights exposure, and top software categories. Identify unmanaged Macs, stale devices, and exceptions that have no owner. At the same time, validate whether your telemetry includes process ancestry, script execution, and persistence events, because you cannot hunt what you cannot see.
Use this first phase to document the most common legitimate software and admin workflows. That baseline will make it much easier to spot anomalies later. It is also the right time to create a standard exception request workflow with expiry dates and business justification fields. If you need a model for process discipline, the structure used in analytics career paths is a useful analogy: define the inputs, define the outputs, then standardize the method.
Days 31 to 60: enforce and reduce
Turn on stronger Gatekeeper and notarization enforcement where possible. Remove standing admin rights from standard users. Create your initial allowlist for business-critical software and block obvious high-risk execution paths. Introduce script restrictions for standard users and alerting for risky interpreter patterns. Coordinate closely with help desk and application owners to avoid surprise disruption.
During this phase, expect some user pushback. That is normal. The answer is not to weaken the policy but to explain the exception process and fix broken workflows with approved tooling. Long-term trust improves when users learn that the controls are consistent and that legitimate needs can be met without creating permanent holes.
Days 61 to 90: hunt and optimize
Once the baseline is stable, begin scheduled threat hunts using the queries above. Track false positives, overblocking, and missed detections. Review every exception older than 30 days and either convert it into a managed software asset or remove it. The goal is to make the hardening program sustainable, not just impressive on paper.
At the end of the first quarter, produce a report with execution-control coverage, admin-rights reduction, patch compliance, and trojan-related detections. Those numbers help justify continued investment and reveal whether the program is truly reducing risk. If you are also modernizing other operational programs, note how this mirrors the incremental hardening approach in enterprise architecture planning: sequence the controls, measure the outcomes, then iterate.
11) FAQ: macOS Trojan Detection and Hardening
How does a trojan usually get onto a Mac in an enterprise?
Most enterprise trojans enter through phishing, fake software updates, malicious installers, cracked or unofficial utilities, and abused script workflows. They typically rely on user execution rather than kernel exploits. The strongest prevention is reducing the number of binaries and scripts users can run without review.
Is notarization enough to block macOS malware?
No. Notarization is a useful trust signal, but it does not guarantee a file is safe. Attackers can still abuse legitimate signing chains, compromise publishers, or use social engineering to get users to run approved-looking software. Use notarization as one layer in a broader allowlisting and telemetry strategy.
What telemetry is most important for trojan detection on macOS?
Process ancestry, command-line arguments, signing metadata, persistence writes, and outbound connections are the highest-value signals. If you can also capture quarantine state, LaunchAgent/LaunchDaemon changes, and script interpreter activity, your detection quality improves significantly.
Should every Mac be fully allowlisted?
Not always, but many enterprise Macs can be partially or fully allowlisted for standard software categories. The stricter the environment, the more value allowlisting provides. For developers and IT staff, use role-based exceptions and managed software catalogs instead of open-ended execution rights.
What is the fastest way to improve macOS hardening without breaking users?
Start with MDM enforcement, admin-rights removal, patch compliance, and a review of risky exceptions. Then add notarization and code-signing enforcement, followed by targeted script controls. This sequence tends to improve security quickly while keeping the user impact manageable.
When should we reimage a suspected infected Mac?
Reimage when the device belongs to a privileged user, when persistence is widespread, when you cannot trust system integrity, or when there is evidence of multiple payload stages. If the device is business critical, rebuild from a known-good baseline rather than trying to clean it manually.
Final Take: Treat macOS as a High-Value Enterprise Platform
The surge in macOS trojans is not a niche warning; it is a sign that attackers have normalized Macs as productive, valuable, and exploitable enterprise targets. That means your defense program must evolve from basic antivirus assumptions to layered endpoint security with real telemetry, strict execution policy, and repeatable hunting. If you already invest in structured governance, apply the same discipline here: define trusted software, narrow script execution, remove standing privilege, and verify every exception.
For most IT teams, the best outcome is not perfect prevention, but a platform where trojans are difficult to launch, easy to spot, and fast to contain. That is the real value of EDR plus hardening: fewer surprises, shorter investigations, and a lower chance that one deceptive installer becomes an enterprise incident. If your macOS program can achieve that, you are well ahead of the curve.
Related Reading
- How to Modernize a Legacy App Without a Big-Bang Cloud Rewrite - Useful for building incremental, low-disruption control upgrades.
- Embed Compliance into EHR Development - Strong model for automation-first policy enforcement.
- Agentic AI in the Enterprise - Helpful framework for operationalizing controls and telemetry.
- Private Cloud Query Observability - Relevant to building scalable detection visibility.
- Three Procurement Questions Every Marketplace Operator Should Ask Before Buying Enterprise Software - Good checklist for evaluating EDR and MDM vendors.
Related Topics
Alex Mercer
Senior Security Editor
Senior editor and content strategist. Writing about technology, design, and the future of digital media. Follow along for deep dives into the industry's moving parts.
Up Next
More stories handpicked for you
Automated Rollback & Verification: Building Fail-Safe Update Pipelines
Avoiding Mass Bricking: Firmware Rollout Best Practices for Device Fleets
Privatizing National Cyber Capabilities: Legal, Operational, and Security Implications
If Public Cyber Defenses Shrink: How Enterprises Should Adjust Their Security Programs
Forensic Playbook: Investigating Mass Photo Downloads on Social Platforms
From Our Network
Trending stories across our publication group