Most Recent Posts
Delete Facebook? How it Impacts Secure Logins to Thousands of Sites
By now, you’ve probably heard about the Delete Facebook movement. Stemming from the alleged misuse of data from over 50 million user accounts (update: 87 million user accounts) by a firm called Cambridge Analytica during the 2016 presidential election, Facebook users have been deleting accounts as a way of showing that they want to control their data. Whether […]
How Being a Parent Makes Me a Better CTO—and Vice Versa
I’m the father of three little girls, ages nine, six, and two. I’m also the CTO of a budding tech company, managing an engineering team of about 50. You might think that these two roles are constantly in conflict (and you might be right), but I’ve come to realize and appreciate that there are lots of parallels between […]
Android P Enhances Support for Autofill in Chrome and Other Browsers
Yesterday, Google previewed Android P—the upcoming version of Android—to Android developers. This preview allows developers to explore the new features and begin envisioning experiences to build when Android P becomes officially available to the public later this year. While many Android blogs will talk exclusively about new features, I want to focus on one of […]
Security + Convenience: Why Your Business Needs a Password Manager
Data breach! The phrase itself is enough to make even the most seasoned IT or security professional cringe. Hackers who exploit weaknesses in your security represent one of the most nefarious dangers to your business, employees, and clients. These aren’t over-exaggerated claims, either. World famous businessman, Warren Buffet, stated that cyber crimes were the number one problem with […]
Dashlane Offers Free Password Protection to Political Campaigns and Elected Officials
Dashlane is providing campaign workers free Dashlane Premium to protect their sensitive data and accounts during the campaign cycle. Dashlane Premium will provide these teams with a robust first line of defense against an ever-growing list of cybersecurity threats. [To redeem the offer, please go to the bottom of this post and click the link […]
Data Breaches and Weak Passwords: A Love Story
Data breaches and malware attacks make headlines every day – and huge, household names are no longer the sole target. Small and mid-sized businesses are increasingly being targeted by cyber criminals and hackers who seek to exploit the brand for their own purposes. Tracking down and eliminating sources of risk can help prevent data theft […]
The Complete Guide to Finding Long-Lost Passwords Hiding Anywhere
Before I began using Dashlane, I used to stash my passwords everywhere, from random pieces of paper to the deepest corners of my computer to my sock drawer. As you can imagine, I had a difficult time keeping up with them. Fortunately, I’ve since learned from my bad password storage habits, and decided to share this simple […]
Intel U2F and Dashlane: an Innovative, Convenient Approach to 2FA
Intel and Dashlane are using an innovative, convenient approach to two-factor authentication (2FA) utilizing the U2F protocol. Dashlane has implemented built-in U2F support for all Windows machines running Intel’s 8th generation chips. Dashlane is an Official Intel Software Partner and the only password manager to support this innovative technology. [Read: Don’t know what 2FA is? Read […]
AI Enters the Business World – How Will it Impact Your Cybersecurity?
Artificial Intelligence, in all of its forms, is here to stay. Any process a machine takes over can be considered AI. In this case, we’ll talk largely about the personal assistant functions which users activate using voice commands. Things like Siri and Alexa offer their users the chance to have a personal assistant perform the tedious jobs of looking […]
Dashlane Business: Our 5 Key Principles
Dashlane Business was inspired by a steady and growing chorus of requests: “I love Dashlane—but I wish all my employees could have the simpler, safer web experience I do.” So we set out to do just that with Dashlane Business 1.0 in 2016. Taking what we learned from real businesses’ feedback in the past few years, […]
Phishing: 5 Methods That Can Harm Your Business
Phishing attacks are difficult threats for IT and Security professionals to eliminate because existing methods continue to evolve in order to disrupt businesses of every size. Attacks typically don’t target seasoned security professionals — instead, criminals are focusing their efforts on the largely negligent employee base, or on specific individuals within a business who tend […]
Shadow IT: How to Mitigate Risks with a Password Manager
Shadow IT is inevitable. With the consumerization of IT and the proliferation of cloud applications, maintaining control over your organization’s security is becoming increasingly difficult. Unless you’re willing to slow employee productivity to a halt by demanding IT approval of every software and cloud application used for work, as well as all personal devices used […]