Security Tips
Cybersecurity Q&A with Fractional CISO’s Founder & CEO Rob Black
Fractional CISO, LLC CEO and Founder Rob Black answers Dashlane’s questions about cybersecurity risks and trends.
Cybersecurity Q&A with Dashlane CTO Frederic Rivain
Dashlane CTO Frederic Rivain shares how he became a security leader and discusses the importance of credential management and security.
Two-Factor Authentication vs. Two-Step Verification: What’s the Difference?
Understanding the difference between two-factor authentication vs. two-step verification can strengthen your security. Here’s what to know.
Case Study: How Kovo HealthTech ensures access and HIPAA compliance for their nationwide workforce
Learn how Kovo HealthTech improved offboarding and HIPAA compliance for their nationwide workforce with Dashlane.
The Best Browsers for Privacy & What Makes a Web Browser Private
The best browsers for privacy, combined with secure internet connections and credential managers, create a worry-free browsing experience.
Cybersecurity Q&A with Sprinto’s Co-Founder Girish Redekar
Sprinto Co-Founder Girish Redekar answers Dashlane’s questions about cybersecurity, SaaS, and so much more.
What Is Clone Phishing? Common Cases & Security Tips
Clone phishing takes social engineering attacks to another level by copying legitimate emails. Cybersecurity tools can combat these attacks.
Passkeys Explained: What Is a Passkey and How Do Passkeys Work?
Learn the simple, technical explanations of passkeys: What they are, how they work, and how they keep users safer than traditional passwords.
What is Network Segmentation & How Does It Work?
Network segmentation, which involves breaking a network into independent sectors, has many important applications and security benefits.
4 Most Common Types of Inherent Risks for IT & Cybersecurity
Discover four types of inherent risks that can impact your organization. Learn how to measure, mitigate, and defend against these risks.