Workplace Tips
Workplace security best practices and recent news

Cybersecurity Q&A with FBI’s Mitchell Thompson + Dashlane CMO Dhiraj Kumar
FBI Supervisory Special Agent Mitchell Thompson and Dashlane Chief Marketing Officer Dhiraj Kumar answer questions about cybersecurity and industry trends.

Cybersecurity Q&A with Fractional CISO’s Founder & CEO Rob Black
Fractional CISO, LLC CEO and Founder Rob Black answers Dashlane’s questions about cybersecurity risks and trends.

Cybersecurity Q&A with Dashlane CTO Frederic Rivain
Dashlane CTO Frederic Rivain shares how he became a security leader and discusses the importance of credential management and security.

Cybersecurity Q&A with Sprinto’s Co-Founder Girish Redekar
Sprinto Co-Founder Girish Redekar answers Dashlane’s questions about cybersecurity, SaaS, and so much more.

What Is Clone Phishing? Common Cases & Security Tips
Clone phishing takes social engineering attacks to another level by copying legitimate emails. Cybersecurity tools can combat these attacks.

What is Network Segmentation & How Does It Work?
Network segmentation, which involves breaking a network into independent sectors, has many important applications and security benefits.

4 Most Common Types of Inherent Risks for IT & Cybersecurity
Discover four types of inherent risks that can impact your organization. Learn how to measure, mitigate, and defend against these risks.

SaaS Q&A with Dashlane’s Chris Hobbick and Efficient App’s Alex Bass and Andra Vomir
Dashlane’s Senior Sales Engineer Chris Hobbick and Efficient App Co-Founders Alex Bass and Andra Vomir answer security and SaaS questions.

An Effective Cybersecurity Audit Should Be Able to Give You These Insights
Cybersecurity audits minimize risks from hacking and data breaches by assessing vulnerabilities, documentation, and regulatory compliance.

What Is a Zero-Day Vulnerability?
What is a zero-day vulnerability? This cybersecurity threat occurs when defects haven’t been fixed yet. Learn how to reduce the likelihood of an attack.