Most Recent Posts

How AI Powers Dashlane’s Autofill, Without Compromising Your Privacy
Dashlane’s autofill uses the power of AI to deliver both accuracy and privacy for an optimal user experience. Learn how.

10 Years of Bug Bounty: Lessons in Building a Strong Security Culture
Dashlane CTO Frederic Rivain shares the evolution of Dashlane’s bug bounty program, how to join, and what to keep in mind if you’re starting your own.

GenAI to Accelerate Internal and External Risks for Businesses
Get key insights about how generative AI is increasing risks for businesses based on data from Verizon’s 2025 Data Breach Investigations Report.

Dashlane Omnix™ Protects Against Credential Breaches with New Insights, Alerts, and More
Insights meet action in Dashlane Omnix, the AI-accelerated platform that delivers proactive intelligence, real-time response, and protected access.

New Data Shows How Shadow IT and Burnt-Out IT Teams Impact Business Security
As part of our credential security report series, get insights from 1,500 employees about the risks of shadow IT and overwhelmed IT teams.

Dashlane Leverages Confidential Computing to Secure Passkeys
Using confidential computing, Dashlane now protects passkeys in a secure cloud environment powered by AWS Nitro Enclaves.

Go Beyond Password Management with Dashlane Omnix™
Dashlane Omnix is a first-of-its-kind intelligent credential security platform that empowers security teams and protects employees.

Closing the Credential Risk Visibility Gap: What Our VP of Product Shared with 100+ Security Execs
Credential risk visibility is a major business need. Dashlane’s VP of Product shares how Credential Risk Detection can help.

Dashlane Names Joanna Chen Chief Information Security Officer
After years of leading security programs at Salesforce and other organizations, Joanna Chen is bringing her expertise to Dashlane as our new CISO.

New Data Shows Traditional Approaches to Credential Security Fail the Modern Workforce
As part of our credential security report series, learn why traditional approaches to business credential security simply aren’t working.