Tech News

Consumer Financial Protection Bureau Recommends Password Management as a Data Security Practice
An overview of the statement the Consumer Financial Protection Board (CFPB) made to warn businesses about weak password management practices.

Everything You Should Know About the Social Engineering Attack at Uber
Find out how the Uber breach happened and what you can do to protect your business from a similar hack.

10 Times Dashlane Made IT Professionals’ Lives Easier
IT admins share 10 times Dashlane made their lives easier.

What to Know About DALL-E Mini, The AI Image Maker
DALL-E is an AI trained on millions of images and captions, capable of creating photorealistic images. Here’s what we think the tool could be used for.

A Beginner’s Guide to Two-Factor Authentication
2-factor authentication adds another layer of security to password protection. Explore how well 2FA really works and review best practices for implementation.

5 Recommendations to Kickstart Your Cybersecurity
Most organizations have increased their cybersecurity awareness, but only some have taken steps to boost their defenses. That’s why we developed 5 recommendations to help organizations start implementing human-centric cybersecurity.

5 Key Cybersecurity Predictions Based on New Survey Data
What does the “future of work” mean for your small or medium-size organization? We surveyed more than 900 employees and leaders to understand cybersecurity trends in the next three years. Read our predictions.

10 New Cybersecurity Trends at Small Businesses
Remote and hybrid workplaces are a game changer for cybersecurity. Learn about the key trends we discovered by surveying workers and IT decision-makers at small and growing organizations.

Roe V. Wade and Privacy: What Data Collection Means for Reproductive Rights
The 6-3 ruling that overturned Roe v. Wade was announced Friday, June 24. With the rise of surveillance culture, as well as apps that collect personal information about menstrual cycles, fertility, and those that track our location, how mindful should people be during this time?

Don’t Get Hooked: Dashlane Celebrates “No Phishing Day”
In honor of Go Fishing Day on June 18th, we’re celebrating (and inventing) No Phishing Day by giving you a few quick tips on how to avoid phishing scams.