Lead AI Strategy with UCSB's Agentic AI Program — Microsoft Certified
PowerBI Data Analyst - Create visualizations and dashboards from scratch
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore Jamf Threat Labs' cloud-based binary scanning service in this 30-minute conference presentation that demonstrates how security teams can validate files without compromising endpoint security. Learn about the development process behind this service, the internal challenges it solved at Jamf, and discover how organizations can leverage this tool to submit file hashes or binaries for analysis against Jamf Protect's detection engine without requiring local execution or endpoint deployment. Examine real-world applications including validating internal applications before deployment and investigating suspicious files in secure environments. Understand how this service integrates into existing security workflows to enhance threat hunting capabilities while reducing operational risk. Watch live demonstrations of the service in action, review practical implementation examples, and discover best practices for incorporating this cloud-based scanning tool into security operations to strengthen your organization's security posture while streamlining file validation processes.
Syllabus
JNUC 2025 - 1109 - Binary Insight: Opening Up Jamf Threat Labs Scanning to Customers
Taught by
Jamf