Engineering

NYC Security Happy Hour 2026: What a $5 Phishing Stack and AI Trust Framework Have in Common
Dashlane’s NYC Security Happy Hour covered the new shape of trust: Progressive trust for AI agents and steps to prevent low-cost OAuth phishing attacks.

Beyond the Engineering Team: How We Governed AI Coding for Everyone
AI tools mean everyone ships code, not just engineers. Here’s how Dashlane built a 4-tier governance framework that keeps everyone accountable.

How Attackers Think: Understanding Your Attack Surface Before They Do
Learn how attackers find your blind spots before you do and how to map your attack surface and threat model as a security-first team.

How Dashlane Secures AI Coding Tools for Its Engineering Team
Dashlane rolled out Claude Code and MCP to 100+ engineers. Here’s how we secured the setup with Dev Containers.

What Makes a Web Page Feel Trustworthy?
Inside Dashlane’s AI phishing detection: How interpretable models analyze webpage structure and behavior to detect modern phishing attacks

Link Sharing: How We Built Secure Credential Sharing Without Seeing Your Data
Get a technical deep dive into Dashlane’s end-to-end encryption (E2EE) architecture for external credential sharing.

Unlocking Portability: Dashlane Launches FIDO Credential Exchange on Android
Dashlane brings FIDO Credential Exchange to Android, enabling secure, seamless password and passkey portability without risky CSV exports.

Introducing the Dashlane MCP Server for AI-Powered Audit Log Access
Dashlane launches an MCP server that lets AI agents securely query audit logs, enabling faster investigations and AI-native security workflows.

Turning Secure by Design into Reality: Dashlane’s One-Year Progress Report
One year into CISA’s Secure by Design pledge, Dashlane shares how phishing resistance, transparency, and privacy-first security reduce risk.

How Dashlane Solved the Zero-Knowledge Activity Log Paradox After 12+ Months
Learn how Dashlane used confidential computing and cloud secure enclaves to create zero-knowledge activity logs that are both encrypted and queryable.
