Dashlane is a web and mobile app that simplifies password management for people and businesses. We empower organizations to protect company and employee data, while helping everyone easily log in to the accounts they need—anytime, anywhere.
7 Ways to Determine if You Have a Strong (or Weak) Password
The strong password definition is clear. It’s easy to determine whether you have a strong or weak password and keep it secure using a password manager.
These New Alerts Notify You When Something’s Phishy
Dashlane is the first password manager to offer built-in, proactive phishing alerts. Now available in the Dashlane web extension.
End-to-End Cybersecurity Q&A with Davison Paull and Mike Maletsky
Davison Paull and Mike Maletsky answer questions about their cybersecurity career journeys, today’s cyber threats, and major industry shifts.
Case Study: How Non-stop dogwear Securely Shares Information Across Five Countries
Case study: Global brand Non-stop dogwear needed a safe way to share passwords across the organization. Dashlane helps them maintain security at scale.
What Is a Digital Footprint and Why Is It Important?
What’s a digital footprint? It’s the sum of your online activities and, over time, it creates a detailed impression of your identity.
Email Security Best Practices to Protect Your Business
Email security best practices combine cybersecurity tools with training and education to protect businesses from email-related cybercrimes.
How to Protect Yourself From Identity Theft
Learn how to protect yourself from identity theft to avoid dangerous cybercrimes that can impact your credit score, finances, and reputation.
Case Study: Why OOLY pivoted on password management solutions
Case Study: Learn why retail company, OOLY, pivoted password management solutions and improved their collaboration.
Stay Secure by Avoiding 7 Common Password Sharing Mistakes
With password sharing almost unavoidable, use secure password sharing methods to prevent password theft, hacking, and data intercepts.
8 of the Most Common Ways Hackers Steal Passwords
How do hackers get passwords? As hacking tactics like spyware, phishing, and man-in-the-middle attacks evolve, protection methods improve.
A Complete Guide to Managing Technology Risk at the Enterprise Level
Technological risk management deploys risk assessments, policies, and technology to protect company systems, processes, and data. Learn more.