Security Tips

How a Manufacturing Company Improves Employee Security Habits Without IT Effort
Learn how Optima Manufacturing got employees to self-remediate credential risks while giving the IT team risk visibility organization-wide.

How Attackers Think: Understanding Your Attack Surface Before They Do
Learn how attackers find your blind spots before you do and how to map your attack surface and threat model as a security-first team.

MFA Methods Compared: SMS, Authenticator Apps, Hardware Keys, and Passkeys
Not all MFA is equal. Compare SMS, authenticator apps, hardware keys, and passkeys side-by-side. Get a framework for enterprise IT admins to deploy phishing-resistant MFA.

How an HVAC Design Company Saves 10% of IT Security’s Time with Proactive Credential Security
Learn how Ambient Enterprises uses Dashlane Omnix™ to automate credential risk remediation and protect 1,800 employees.

SaaS Sprawl: How to Manage Shadow IT and Unsanctioned Apps
SaaS sprawl creates security blind spots IT teams can’t afford. Learn how to detect unsanctioned apps, run a SaaS audit, and regain access control.

Q&A: How Staypineapple Balances AI Innovation, Access Management, and Security
Struggling to secure credentials while adopting AI? See how Staypineapple’s IT VP governs access, prevents phishing, and fuels innovation.

What Is Zero Trust Security? A Guide for IT Teams
Zero trust security is a framework built on one principle: Never trust, always verify. Learn how zero trust works, its three core tenets, and how enterprise password management fits into a zero trust strategy.

How an Affordable Housing Organization Gained Credential Risk Visibility for Every Employee
Learn how Housing New Mexico uses browser-based risk visibility to protect sensitive data and improve security culture.

How a Growing Anti-Fraud SaaS Company Goes Beyond Password Management
Learn why Thirdfort chose Dashlane over 1Password, gaining robust credential risk visibility and management with the Dashlane Omnix platform.

How a Fully Remote Tech Company Secures Access While Minimizing IT Burden
Learn how Wonolo gained visibility into credential risk while protecting a remote, global workforce and ensuring 100% adoption.

