Data & Culture
Digital privacy, surveillance, and taking back control of our data

GenAI to Accelerate Internal and External Risks for Businesses
Get key insights about how generative AI is increasing risks for businesses based on data from Verizon’s 2025 Data Breach Investigations Report.

New Data Shows How Shadow IT and Burnt-Out IT Teams Impact Business Security
As part of our credential security report series, get insights from 1,500 employees about the risks of shadow IT and overwhelmed IT teams.

Closing the Credential Risk Visibility Gap: What Our VP of Product Shared with 100+ Security Execs
Credential risk visibility is a major business need. Dashlane’s VP of Product shares how Credential Risk Detection can help.

New Data Shows Traditional Approaches to Credential Security Fail the Modern Workforce
As part of our credential security report series, learn why traditional approaches to business credential security simply aren’t working.

2025 Dashlane Security Summit: What We Learned from 4 Industry Leaders
Dashlane CTO Frederic Rivain shares his favorite insights from the 2025 Dashlane Security Summit, from shadow AI to stealer logs and more.

AI’s Impact on Credential Security: 5 Takeaways from Our Expert-Led Fireside Chat
Get 5 key insights from our recent fireside chat about how to protect your organization from AI-powered phishing with credential management.

New Data Shows Impact of AI-Powered Phishing on Businesses
As part of our credential security report series, discover new data about how AI is accelerating phishing attacks against businesses.

3 Recommendations for a Human-Centric Approach to IAM, According to Gartner
In a recent report, Gartner provides recommendations for how organizations can enact effective IAM security controls with their employees in mind.

Passkeys Explained: How to Create Passkeys for Google, Amazon, and More
For easier and more secure authentication, learn how to create a passkey for Google, Amazon, and other popular services in just a few steps.

How Privacy Computing Protects Personal & Professional Data
Learn about privacy computing and how it protects personal and professional data with encryption, zero-trust, and secure data practices.