Workplace Tips
Workplace security best practices and recent news

FAQ: How Much Is Phishing Costing My Company, and What Can I Do About It?
Understand how AI is accelerating phishing, what that’s costing your business, and what you can do about it, among other key phishing topics.

Identity Under Attack: Lessons on AI-Driven Credential Risks from Security Experts
Discover 3 key takeaways from security leaders at Dashlane and Morgan Stanley about how AI-driven credential threats are impacting businesses.

Don’t Let Your Credential Manager Become Shelfware: 5 Ways to Increase Adoption
Learn 5 proven strategies IT admins can use to boost credential manager adoption and protect their organizations’ passwords.

How to Build the Case for a Credential Manager: Answers to Common Concerns
To help your organization’s decision makers understand the value of a credential manager, review these 5 common concerns and how to respond.

How to Build the Case for a Credential Manager: The Cost of Doing Nothing
Not having a standalone credential manager comes with high costs to your organization’s security, productivity, and reputation.

The ROI of Credential Management: Understand the Benefits Before It’s Too Late
Dashlane’s SVP of Product and Partnerships and VP of Product Marketing discuss the tremendous costs of doing nothing when it comes to credential security.

Proactive Credential Security: Why You Need It and What It Takes to Implement It
Dashlane’s CTO and Product Management Director discuss the impact proactive credential security can have for organizations and how to implement it effectively.

8 IoT Risks Every Organization Needs to Be Aware Of
Discover 8 key IoT risks, from data breaches to malware, and learn how to protect your business with strong IoT security strategies.

5 Common SSO Integrations to Consider Before Choosing a Solution
Discover the top 5 single sign-on (SSO) integrations and how they can improve your network’s security and facilitate a better user experience.

5 Machine-to-Machine (M2M) Applications & Use Cases
Explore the benefits, applications, and security challenges of machine-to-machine (M2M) technology across industries.