Most Recent Posts
3 Strategies to Prevent Breaches and Hacks at Work
Here are the three essential strategies for preventing data breaches and hacks, and other ways to enact damage control.
3 Key Steps to Building a Compliance Training Program
Guest contributor Naya Moss is an IT pro and infosec leader breaking down the basics of creating your own compliance training.
A Deep Dive into Web Extension Security
A few months back we shared some insights about the security of our web extension and explained our approach to security on the web platform. In this article, we’d like to go one step deeper and help clarify that our web-first experience is much more than a web app, and highlight a few risk scenarios we evaluate […]
Dashlane Migration Hub for Businesses
In January, we announced that Dashlane’s default desktop experience was going to be our browser extension and embedded web app. This move towards the web and away from our legacy desktop apps has allowed us to provide a superior autofill experience, made setup for new customers and new employees a breeze, and unlocked faster development of new and improved features. The web-first Dashlane experience is already available to […]
Top 5 Benefits and 3 Challenges of Implementing Identity and Access Management
Cybersecurity risks are on the rise, especially when it comes to data-driven companies. Identity and Access Management (IAM) can help.
How to Get Perfect UX by Setting Up Your Forms for Dashlane
Learn this tiny change you can make to your website for faster and even more reliable Dashlane integration.
What’s Your Number? How to Avoid Port-Out Scams.
Hackers can use your cell phone number for a cyberattack known as a port-out scam. Here’s how they work and how you can protect yourself.
What to Do If Your Company’s Been Hacked or Breached
When it comes to hacks or breaches at your business, the quicker you act, the better. Here’s everything you need to do if you experience a company data breach.
Executive Order on Cybersecurity Names Password Managers Critical Software—What It Means for Your Business
After a recent executive order on cybersecurity, federal government now views password managers as critical to endpoint security—and you should, too.
Create a Culture of Cybersecurity: Teach Employees to “Catch a Phish”
At the end of the day, negative emotions won’t help you build an effective culture of cybersecurity awareness. HR departments should make it their goal to nurture a blame-free, empowering security culture where all employees feel they are contributing to a shared goal.