Most Recent Posts

3 Recommendations for a Human-Centric Approach to IAM, According to Gartner
In a recent report, Gartner provides recommendations for how organizations can enact effective IAM security controls with their employees in mind.

Autofill Any Data Type on iOS 18 with Dashlane’s Context Menu Autofill
With the latest updates in iOS 18, Dashlane is bringing a significant enhancement to autofill: Context Menu Autofill.

How We Brought Dark Theme to Dashlane
Dashlane is launching a dark theme on our web app, and it’s been years in the making. Learn about our journey to the dark side.

The ROI of Credential Management: Understand the Benefits Before It’s Too Late
Dashlane’s SVP of Product and Partnerships and VP of Product Marketing discuss the tremendous costs of doing nothing when it comes to credential security.

Passkeys Explained: How to Create Passkeys for Google, Amazon, and More
For easier and more secure authentication, learn how to create a passkey for Google, Amazon, and other popular services in just a few steps.

How Privacy Computing Protects Personal & Professional Data
Learn about privacy computing and how it protects personal and professional data with encryption, zero-trust, and secure data practices.

Dashlane’s Web Extension Code Now Publicly Available
Transparency and trust are core values at Dashlane, and we strive to reflect them in everything we do. By being open about our codebase, we aim to strengthen the trust our customers have in our product. Following on the release of our Mobile and Command Line codebases, we are now making our Web Extension code […]

Proactive Credential Security: Why You Need It and What It Takes to Implement It
Dashlane’s CTO and Product Management Director discuss the impact proactive credential security can have for organizations and how to implement it effectively.

Introducing the New and Improved Dashlane Partner Program
Dashlane has improved its partner program to offer new benefits and resources that help resellers increase their clients’ security and generate sales.

8 IoT Risks Every Organization Needs to Be Aware Of
Discover 8 key IoT risks, from data breaches to malware, and learn how to protect your business with strong IoT security strategies.