Engineering

Inside Dashlane’s Privacy-First Approach to Credential Risk Detection
Dashlane’s co-founder and VP of Architecture shares how we built Credential Risk Detection to give IT admins proactive insights while maintaining security and privacy.

A Journey Toward a Phishing-Resistant Future
From MFA to passkeys and beyond, Dashlane’s CTO describes our ongoing, innovative journey toward the most secure authentication possible.

The Last Line of Defense: How AI-Powered Real-Time Phishing Detection Builds Phishing Resistance
Dashlane’s machine learning engineer shares how our real-time, AI-powered phishing detection protects employees, even if they’re not logged into Dashlane.

How AI Powers Dashlane’s Autofill, Without Compromising Your Privacy
Dashlane’s autofill uses the power of AI to deliver both accuracy and privacy for an optimal user experience. Learn how.

10 Years of Bug Bounty: Lessons in Building a Strong Security Culture
Dashlane CTO Frederic Rivain shares the evolution of Dashlane’s bug bounty program, how to join, and what to keep in mind if you’re starting your own.

Use Dashlane to Log In on Your Android Watch with Passkeys
Welcome to a better authentication experience on smartwatches.

Dashlane’s Commitment to CISA’s Secure by Design Pledge
Dashlane is a proud signee of the Cybersecurity and Infrastructure Security Agency (CISA) Secure by Design pledge.

How We Brought Dark Theme to Dashlane
Dashlane is launching a dark theme on our web app, and it’s been years in the making. Learn about our journey to the dark side.

Dashlane’s Web Extension Code Now Publicly Available
Transparency and trust are core values at Dashlane, and we strive to reflect them in everything we do. By being open about our codebase, we aim to strengthen the trust our customers have in our product. Following on the release of our Mobile and Command Line codebases, we are now making our Web Extension code […]

Pushing Zero-Knowledge Boundaries With Confidential Computing
Dashlane continues to innovate with confidential computing and secure enclaves, processing customer data securely and privately.

