Most Recent Posts

How Attackers Think: Understanding Your Attack Surface Before They Do
Learn how attackers find your blind spots before you do and how to map your attack surface and threat model as a security-first team.

MFA Methods Compared: SMS, Authenticator Apps, Hardware Keys, and Passkeys
Not all MFA is equal. Compare SMS, authenticator apps, hardware keys, and passkeys side-by-side. Get a framework for enterprise IT admins to deploy phishing-resistant MFA.

[Apr 2026] What’s New at Dashlane: KnowBe4 Integration, More Detailed Risk Detection Logs, and More
Discover what’s new at Dashlane in April 2026: KnowBe4 integration, smarter risk detection logs, SSO alerts, and faster Android autofill.

How an HVAC Design Company Saves 5 to 10% of IT Security’s Time with Proactive Credential Security
Learn how Ambient Enterprises uses Dashlane Omnix™ to automate credential risk remediation and protect 1,800 employees.

How Dashlane Secures AI Coding Tools for Its Engineering Team
Dashlane rolled out Claude Code and MCP to 100+ engineers. Here’s how we secured the setup with Dev Containers.

Mythos Changes the Speed of Attacks, But Not Cybersecurity Fundamentals
Will Mythos AI accelerate attacks? Dashlane’s zero-knowledge architecture and proactive resilience defend against zero-day threats.

SaaS Sprawl: How to Manage Shadow IT and Unsanctioned Apps
SaaS sprawl creates security blind spots IT teams can’t afford. Learn how to detect unsanctioned apps, run a SaaS audit, and regain access control.

What Makes a Web Page Feel Trustworthy?
Inside Dashlane’s AI phishing detection: How interpretable models analyze webpage structure and behavior to detect modern phishing attacks

Link Sharing: How We Built Secure Credential Sharing Without Seeing Your Data
Get a technical deep dive into Dashlane’s end-to-end encryption (E2EE) architecture for external credential sharing.

Beyond SSO: Dashlane’s CEO on Real-Time Credential Protection in the AI Era
Dashlane CEO John Bennett explains how AI is changing phishing and credential risk, as well as what security teams must do to stay ahead.

