Most Recent Posts
What the Hack Is a Brute Force Attack?
Brute-force attacks are like when you spend five minutes jamming the wrong key into your front door, hoping it might finally work.
Exploring a Safer Future at RSA 2020
Dashlane is once again heading to the RSA Conference, an information security event that connects attendees with industry leaders and innovative technologies (like Dashlane!). This year, RSA is humanizing the conversation: “When we recognize that cybersecurity is, fundamentally, about people protecting people, the world becomes a better, more secure place.” Dashlane Booth DetailsWhere: Booth #3130, […]
Contributing to Free Open Source Projects
Here we explore some possibilities for companies to support FOSS projects and the benefits of doing so.
A Closer Look at Loretta: Big Tech’s Big Game Commercials
Viewed through the reality of surveillance capitalism, Big Tech’s commercials last Sunday take on a new light.
9 Cybersecurity Podcasts Business Leaders Should Listen To
Make sure you’re aware of the latest security trends in your industry. Podcasts have grown from a niche format to a popular and entertaining media platform for millions of people. Taking a conversational approach to complex issues is extremely useful in many fields. It’s no surprise podcasts based on such complex subjects as law, medicine, […]
What the Hack Is a Dead Man’s Switch?
If you want to remember the concept behind dead man’s switch, just think of legendary character actor Joe Morton.
Dashlane Makes a Statement in the Sunday New York Times
Dashlane took over the back page of the New York Times Business section today—and it’s no coincidence that we did so on the night of the Big Game. We knew Big Tech would be there (and we’ll be there, too!) and we couldn’t let an opportunity to set the record straight pass us by: The […]
What the Hack Is Malware?
Some viruses are created simply to annoy their hosts. Others scrub your software for data its creators can use or sell for their own gain—and potentially to your detriment.
Do Biometric Technologies Eliminate the Need for Passwords?
Find out if Face ID and Touch ID will make the world move beyond the password. Face ID. Fingerprint biometrics. Access to a device through detection of typical user patterns. Science fiction has taught entire generations of tech entrepreneurs that the future will be password-free. Many security professionals are happy to call every new authentication […]
Protect Your Data When a Third-Party Website Gets Hacked
Learn how to quarantine compromised data when a trusted partner is attacked. When a high-profile data breach occurs, people aren’t necessarily worried about the company that suffered the breach. Instead, they’re concern is for the end-users of that company’s systems. Those users,customers and employees,are the ones whose sensitive data is at risk. A data breach […]
Exploring React Native on Windows
This is the second in our series of blog posts around Windows desktop technologies. After exploring Electron, we decided to spend time investigating a brand new technology: React Native for Windows. One of our goals was to assess how much mutualization can happen between a Windows React Native code and a Web ReactJS code. We […]
Behind the Scenes: Dashlane’s Big Game Commercial
Why was this the year we headed to Sunday’s game? Well, the thing we care most about has become a universal problem: password pain. We’ve all felt it. The constant frustration of forgetting and resetting your ever-expanding list of account passwords. Plus, there’s a growing sense that you’re always one hack away from a bad […]