Most Recent Posts

These Books and Podcasts Answer Your Burning Questions On Security and Big Tech
Stay informed about online security, cyber threats, and the apps we use every day with these cybersecurity-focused books and podcasts.

How a Global Supply Chain Company Made Security Audits a Breeze
See how Allport Cargo Services, a privately held third-party logistics provider, secures & audits passwords with Dashlane.

What Many Recent Data Breaches Have in Common
What are the common causes of data breaches? Most can be traced to human factors like weak passwords and social engineering attacks.

What Is Password Hashing?
What is password hashing? Discover how it works, the algorithms it uses, and why it’s crucial for data security.

An Update on Post-Quantum Work at Dashlane
As technology advances, so does the need for stronger and more secure methods of encryption. With the advent of quantum computing, traditional cryptographic methods may soon become obsolete, making it crucial for businesses to prepare for post-quantum cryptography. One challenge with post-quantum cryptography is that every piece of information that’s encrypted today and intended to […]

Excel Spreadsheets: How to Password Protect Your Excel Files
Learn how to password-protect Excel files to secure sensitive business data and formulas with our detailed guide.

How to Password Protect Your PDF Files
Learn how to password protect a PDF to improve security and traceability for signed agreements, intellectual property, and other documents.

Next-Level Folder Capabilities & 2 More New Features That Simplify IT Admins’ Lives
Dashlane’s 3 new features, including new folder capabilities, make IT admin’s lives and day-to-day workflows easier.

How the Dashlane Extension Is Getting More Modular with NestJS
Dashlane uses NestJS, a framework for building Node.js server-side applications, in our web extension. Here’s why.

How To Tell if a Site Is Really Safe To Use: 8 Key Signs
Malware, data intercepts, and lack of privacy are constant internet threats. Follow these tips to help identify if a site is safe to use.