Workplace Tips
Workplace security best practices and recent news

Q&A: How Staypineapple Balances AI Innovation, Access Management, and Security
Struggling to secure credentials while adopting AI? See how Staypineapple’s IT VP governs access, prevents phishing, and fuels innovation.

What Is Zero Trust Security? A Guide for IT Teams
Zero trust security is a framework built on one principle: Never trust, always verify. Learn how zero trust works, its three core tenets, and how enterprise password management fits into a zero trust strategy.

FAQ: How Much Is Phishing Costing My Company, and What Can I Do About It?
Understand how AI is accelerating phishing, what that’s costing your business, and what you can do about it, among other key phishing topics.

Identity Under Attack: Lessons on AI-Driven Credential Risks from Security Experts
Discover 3 key takeaways from security leaders at Dashlane and Morgan Stanley about how AI-driven credential threats are impacting businesses.

Don’t Let Your Credential Manager Become Shelfware: 5 Ways to Increase Adoption
Learn 5 proven strategies IT admins can use to boost credential manager adoption and protect their organizations’ passwords.

How to Build the Case for a Credential Manager: Answers to Common Concerns
To help your organization’s decision makers understand the value of a credential manager, review these 5 common concerns and how to respond.

How to Build the Case for a Credential Manager: The Cost of Doing Nothing
Not having a standalone credential manager comes with high costs to your organization’s security, productivity, and reputation.

The ROI of Credential Management: Understand the Benefits Before It’s Too Late
Dashlane’s SVP of Product and Partnerships and VP of Product Marketing discuss the tremendous costs of doing nothing when it comes to credential security.

Proactive Credential Security: Why You Need It and What It Takes to Implement It
Dashlane’s CTO and Product Management Director discuss the impact proactive credential security can have for organizations and how to implement it effectively.

8 IoT Risks Every Organization Needs to Be Aware Of
Discover 8 key IoT risks, from data breaches to malware, and learn how to protect your business with strong IoT security strategies.

