business security

How to Build the Case for a Credential Manager: The Cost of Doing Nothing
Not having a standalone credential manager comes with high costs to your organization’s security, productivity, and reputation.

New Data Shows Impact of AI-Powered Phishing on Businesses
As part of our credential security report series, discover new data about how AI is accelerating phishing attacks against businesses.

Unlock Seamless Access with the Dashlane Public API
The new Dashlane Public API gives organizations secure access to key data that helps them streamline operations and enhance security.

How Privacy Computing Protects Personal & Professional Data
Learn about privacy computing and how it protects personal and professional data with encryption, zero-trust, and secure data practices.

8 IoT Risks Every Organization Needs to Be Aware Of
Discover 8 key IoT risks, from data breaches to malware, and learn how to protect your business with strong IoT security strategies.

Q&A with Dashlane’s CTO: How Security Leaders Can Address Major Causes of Breaches
Dashlane CTO Frederic Rivain shares his thoughts on how security leaders can achieve more proactive security, what gives him hope, and other insights.

How SSH Keys Can Transform Your Organization’s Security
Securing SSH keys is crucial for your organization’s security. Learn best practices to prevent unauthorized access, ensure data integrity, and protect your network.

Protect Every Employee Credential With Dashlane
Credential Risk Detection + Dashlane Nudges = Greater visibility and faster risk response Cyberattacks frequently exploit human error and target employee credentials, a trend highlighted in IBM’s Cost of a Data Breach Report. Compromised credentials are a common attack vector. To combat this threat, we’re excited to introduce two innovative features that empower security and […]

Going Beyond Password Management to Deliver Proactive Credential Security
Dashlane is transforming how organizations secure employee access and credentials with a new, industry-first approach Here’s a snapshot of what business security is like right now: Security teams lack enterprise-wide visibility into credential risks because employees and departments are using unmanaged apps—leaving corporate data unprotected. Proactively building cyber defenses is a challenge. Human error or […]

What is DNS Cache Poisoning or DNS Spoofing?
Combat DNS cache poisoning by learning how it works, the potential consequences, and five effective mitigation strategies.