Data & Culture
Digital privacy, surveillance, and taking back control of our data
Black Hat 2023 Review: The Seven Biggest Takeaways and What’s Ahead
The Black Hat 2023 security conference covered the power of AI, passkeys as the future of authentication, and much more.
These Books and Podcasts Answer Your Burning Questions On Security and Big Tech
Stay informed about online security, cyber threats, and the apps we use every day with these cybersecurity-focused books and podcasts.
Strange Security: What to Know About Generative AI and Cybersecurity
We’re talking all things AI and the impact of generative AI, like ChatGPT, on cybersecurity and culture.
10 Common Passkey Questions and Their Answers
This blog discusses passkeys, including what they are, how they work, and how they can simplify your security.
The Dark Web Iceberg Explained In Simple Terms
The dark web iceberg includes a familiar, searchable internet along with an unsearchable, private region where both legal and illicit activities occur.
5 LGBTQIA+ Tech Organizations to Join or Support During Pride Month
Learn about the organizations uplifting LGBTQIA+ tech professionals and using tech to support the community at large.
Celebrating World Password Day: May 4, 2023
May 4th is World Password Day. This holiday is the perfect time to review password security trends and tips to improve password hygiene.
What Is Data Privacy & Why Is It Important?
Data privacy practices safeguard our ability to control how our personal or confidential information is communicated, stored, or shared.
11 Cyber Threats To Be Aware of & Defend Against
Cyber threats can come from both inside and outside an organization and are mitigated through the use of cybersecurity policies and tools.
From MV2 to MV3: What to Expect From Dashlane’s MV3 Web Extension
You might have heard that we’re approaching one of the most impactful architectural changes in the world of web extensions. Web browser makers, including Google, are introducing Manifest Version 3 (MV3) to ensure that the extension ecosystem remains secure and scalable and has the potential to extend beyond desktop environments. The 3 pillars of MV3 […]