Most Recent Posts
A Complete Guide to Asymmetric Encryption: Definition & Uses
Asymmetric encryption is a powerful tool used for many everyday online transactions and communications, like messaging and email.
What I’ve Learned From My Time in Traditional and Agile Project Management and Operations Roles
In December 2019, I was offered the opportunity to join Dashlane as an agile project manager. It was an exciting challenge that thrilled me just as much as it made me nervous. I had spent the first 10 years of my professional life working mostly as a “traditional” project manager in the construction industry, so […]
How to Prevent Ransomware Attacks on Your Devices
Ransomware is a growing security threat, but we can prevent ransomware by implementing a few cybersecurity tools and best practices.
IT Security: Your Guide to Common Terms
This final post in our 5-part series discusses common IT security terms. Learn about what it takes to secure personal and business logins.
Do You Know the Likelihood of a Cyberattack on Your Company?
What’s the likelihood of a cyberattack on your company? Learn the risks, common types of attacks, and techniques for staying one step ahead.
4 Password Habits That Put Your Organization at Risk
Learn how password managers make it easy to establish best practices and help employees take control of their cybersecurity.
How To Make Sure Your Chrome Extensions Are Safe
Learn how to make sure your Chrome extensions are safe. Spot suspicious extensions, safely remove them, and replace them with safer options.
9 Practical Password Security Best Practices
Password security best practices, including strong password creation and 2FA, create good password hygiene habits and protect your data.
How We Study & Improve The Accuracy of Our Machine Learning Models
At Dashlane, we use Machine Learning Models to classify HTML fields’ categories (for example, username, email, address, and so on) and fill them with appropriate data from users’ vaults. It’s unavoidable for the model to make incorrect predictions, and we’re looking at ways to improve our user experience by fixing these issues quickly. During the […]
Are Private Browsers Really Private + Tips for Secure Browsing
Are private browsers really private? Although they can delete cookies and browsing history, private browsers have some limitations.
How to Organize Your Swift Packages
If you want proper code organization for your iOS or macOS app in 2023, consider Swift packages: reusable components of Swift, Objective-C, Objective-C++, C, or C++ code. Using Swift Package Manager, you can modularize your code very easily, and everything is also integrated into Xcode. I won’t be explaining Swift packages, how to create a […]