Most Recent Posts
What Many Recent Data Breaches Have in Common
What are the common causes of data breaches? Most can be traced to human factors like weak passwords and social engineering attacks.
What Is Password Hashing?
What is password hashing? Discover how it works, the algorithms it uses, and why it’s crucial for data security.
An Update on Post-Quantum Work at Dashlane
As technology advances, so does the need for stronger and more secure methods of encryption. With the advent of quantum computing, traditional cryptographic methods may soon become obsolete, making it crucial for businesses to prepare for post-quantum cryptography. One challenge with post-quantum cryptography is that every piece of information that’s encrypted today and intended to […]
Excel Spreadsheets: How to Password Protect Your Excel Files
Learn how to password-protect Excel files to secure sensitive business data and formulas with our detailed guide.
How to Password Protect Your PDF Files
Learn how to password protect a PDF to improve security and traceability for signed agreements, intellectual property, and other documents.
Next-Level Folder Capabilities & 2 More New Features That Simplify IT Admins’ Lives
Dashlane’s 3 new features, including new folder capabilities, make IT admin’s lives and day-to-day workflows easier.
How the Dashlane Extension Is Getting More Modular with NestJS
Dashlane uses NestJS, a framework for building Node.js server-side applications, in our web extension. Here’s why.
How To Tell if a Site Is Really Safe To Use: 8 Key Signs
Malware, data intercepts, and lack of privacy are constant internet threats. Follow these tips to help identify if a site is safe to use.
Strange Security: What to Know About Generative AI and Cybersecurity
We’re talking all things AI and the impact of generative AI, like ChatGPT, on cybersecurity and culture.
Password Psychology: How to Create Safe Passwords at Work
Password psychology uncovers how personality types and habits drive our password behavior and can make or break our online security profiles.