Most Recent Posts

Security Terms 101: What Zero-Knowledge Architecture, Encryption, and More Really Mean
Learn more about industry terms such as zero-knowledge, encryption, key derivation functions, confidential computing, zero-trust, and more.

10 Common Passkey Questions and Their Answers
This blog discusses passkeys, including what they are, how they work, and how they can simplify your security.

Protect Your Online Business at Any Stage: A Guide for Digital Entrepreneurs
If you’re an owner of a small, digital-first business, follow these security best practices to protect your logins and secure online assets.

The Dark Web Iceberg Explained In Simple Terms
The dark web iceberg includes a familiar, searchable internet along with an unsearchable, private region where both legal and illicit activities occur.

What We’ve Learned From Tracking Machine Learning Experiments With ClearML
Co-written by Tien Duc Cao, Dashlane Senior Machine Learning Engineer, and Quentin Grail, Dashlane Machine Learning Engineer At Dashlane, we’re working on multiple experimental projects that involve machine learning (ML) applications. To manage experiments, we use ClearML, an open-source MLOps framework that allows us to better organize all our machine learning experiments. When running ML […]

Dashlane Releases Passkey Support on Android
Dashlane is bringing third-party passkey support to Android 14 users. Now they can use Dashlane on websites and apps that support passkeys.

BYOD Policies for Organizations (4 Examples)
BYOD policies for organizations help address cybersecurity threats, ownership issues, and safety concerns of using personal devices at work.

7 Business WiFi Security Best Practices To Protect Your Company
Business WiFi security can be improved by applying basic practices and cybersecurity tools to keep company data safe on wireless networks.

Are Digital Wallets Safe?
Digital wallets let you complete purchases simply by autofilling or tapping your device at the point of sale. But are digital wallets safe?

A Complete List of PCI Password Requirements for Businesses
PCI password requirements include password hygiene best practices and multi-factor authentication to protect online credit card transactions.