cybersecurity

Cybersecurity Q&A with Sprinto’s Co-Founder Girish Redekar
Sprinto Co-Founder Girish Redekar answers Dashlane’s questions about cybersecurity, SaaS, and so much more.

What Is Clone Phishing? Common Cases & Security Tips
Clone phishing takes social engineering attacks to another level by copying legitimate emails. Cybersecurity tools can combat these attacks.

4 Most Common Types of Inherent Risks for IT & Cybersecurity
Discover four types of inherent risks that can impact your organization. Learn how to measure, mitigate, and defend against these risks.

SaaS Q&A with Dashlane’s Chris Hobbick and Efficient App’s Alex Bass and Andra Vomir
Dashlane’s Senior Sales Engineer Chris Hobbick and Efficient App Co-Founders Alex Bass and Andra Vomir answer security and SaaS questions.

What Is a Zero-Day Vulnerability?
What is a zero-day vulnerability? This cybersecurity threat occurs when defects haven’t been fixed yet. Learn how to reduce the likelihood of an attack.

How a Credit Union Safeguards Their Passwords and Reputation
Learn how MTC Federal easily onboarded their entire team to Dashlane, giving IT admins a firm grasp on the company’s security.

The Power of Combined Security: Safeguarding Employee Credentials With SSO and a Credential Manager
Learn why your business should consider implementing SSO along with a credential manager to improve security and streamline employee access.

Benefits of Artificial Intelligence in Cybersecurity
High data capacity, learning capabilities, impressive threat detection, and an improved UX make AI in cybersecurity a valuable asset.

How a Food-Based Nonprofit Cultivated and Simplified Their Cybersecurity
Learn why U.S. non-profit FoodCorps partnered with Dashlane to simplify login sharing and scale securely.

Why Security Teams Are Important
Security teams are essential for keeping organizations protected from cyberattacks. Learn what to consider when building your own.