Most Recent Posts

Building a New A/B Testing Engine at Dashlane
Let’s say you are updating some feature of your product, or adding a new one. You want to make sure it’ll have a positive impact. There are several ways to do that: “Before / After” method is the most simple one. You release and then monitor results. Eventually, the results are positive and you maintain […]

How Android Engineers Grow Along With the Team at Dashlane
At Dashlane, the Android team is growing quickly. As the business expands, the projects and codebase are also increasing at an incredible speed. In the past two years, the team has grown from two engineers to eight and we’ve added an additional office. It is exciting to be part of a fast-growing company and a […]

Refactor Should No Longer Live on the Edge of Development
Once upon a time, there was a good software engineer whose customers knew exactly what they wanted. The good software engineer worked very hard to design the perfect system that would solve all the customers’ problems now and for decades. When the perfect system was designed, implemented, and finally deployed, the customers were very happy […]

Master Holiday Shopping with Dashlane
The holiday season is upon us once more, and you’re probably thinking of all the gifts you need to buy. It’s hard enough navigating the endless promotions, discounts, and sales—wouldn’t it be nice if there were a way to expedite the entire process? Enter Dashlane. Dashlane zips you through online checkouts by logging you in […]

Developers, Help Us Help Your Users
Unfortunately you have no choices… Sometimes, your users needs to login, enter a credit card number, a first name, a last name… to be short: Your users have to complete a form. You probably know this is where the “friction” starts. This internet drudgery has become something billions of people accept as the norm, and […]

7 Tips for Staying Safe Online During the Holiday Season
Every year the holidays bring an online shopping rush, and while you’re tracking and tackling all those flash discounts and “today only” sales, fraudsters are equally busy taking advantage of the seasonal gift-buying craze. Luckily, there are ways to shop online that mitigate a lot of the risks associated with sharing and storing your sensitive […]

The Importance of End-User Experience in Selecting Password Management Tools
IT leaders need to prioritize the end-user experience when it comes to security software. It’s a well-known fact that an organization’s security chain is only as strong as its weakest link. The professional cybercriminals responsible for costly, reputation-damaging data breaches know what to look for when scouting new attack opportunities. The common-sense strategy of striking […]

Just Hours After Launching Disney+, Thousands of User Accounts Landed on the Dark Web
Did Disney get hacked? The very same day Disney’s new streaming service went live, hackers began stealing Disney+ user accounts and selling them on the dark web for as little as $3. Many customers were locked out of their accounts and spent hours waiting on customer support. But is Disney to blame? “Disney takes the […]

Sharing Passwords Through Slack Is Risky
Make sure your employees know how to identify a secure channel for password sharing. Securely sharing a password is no easy task. Organizations that enforce strict password policies will often have IT professionals generate random passwords for their employees. This is a good move for password security, but it presents a difficult problem. Once you […]

How to Spot a Phishing Scam
Sometimes it’s obvious. That message from a Nigerian prince requesting you wire $2,000? Ok, probably not going to fall for that one. If the CEO of your company asks for your credit card information via email? Something is definitely off. But often phishing is harder to spot. Phishing is a common scheme in which someone […]

Size Doesn’t Matter: Cybercriminals Target Small & Mid-Size Businesses
Although major data breaches make headlines, smaller companies are at a larger risk. Yahoo. Equifax. Marriott. High-profile data breaches involving hundreds of millions of users have become regular occurrences, and their frequency is increasing. However, more data breaches happen every day than anyone can reliably count, and it’s because they’re happening to organizations that aren’t […]

Dashlane Ranks Among Fastest Growing Companies in North America on Deloitte’s 2019 Technology Fast 500™ for Third Consecutive Year
NEW YORK, November 7, 2019 — Dashlane today announced it ranked on Deloitte’s Technology Fast 500™, a ranking of the 500 fastest growing technology, media, telecommunications, life sciences and energy tech companies in North America now in its 25th year. On a path to define the future of digital identity protection and optimize life online, […]