Most Recent Posts

2026 Security Forecast: A CTO’s 5 Predictions About Passkeys, AI Threats, and More
Dashlane’s CTO shares his 5 predictions for how security will change in 2026, including the impact of AI threats on businesses.

The Power of Zero Knowledge: How Dashlane Builds Security for Your Digital Kingdom
Learn how Dashlane uses zero knowledge to encrypt and decrypt data only on your devices, protecting your digital kingdom from breaches.

How a Growing Anti-Fraud SaaS Company Goes Beyond Password Management with Dashlane Omnix
Learn why Thirdfort chose Dashlane over 1Password, gaining robust credential risk visibility and management with the Dashlane Omnix platform.

Why Browser-Native Security Matters: Dashlane’s Approach to Protection at the Point of Risk
Browser-native security is redefining enterprise protection. Learn how Dashlane safeguards work at the point of risk: Inside the browser.

Inside the Paris Security Happy Hour: Tokens, Trust, and the Future of Digital Identity
Discover key insights from Dashlane’s Paris Security Happy Hour, from OAuth token risks to privacy-first ways to verify real humans online.

How a Fully Remote Tech Company Secures Access While Minimizing IT Burden
Learn how Wonolo gained visibility into credential risk while protecting a remote, global workforce and ensuring 100% adoption.

How JFK International Airport’s Largest Terminal Defends Their ‘Human Firewall’ and Secures Operations
Learn how JFK International Air Terminal 4 builds cyber resiliency while transporting 27 million passengers annually.

The 2025 Dashlane Passkey Power 20
A one-of-a-kind look at the apps leading the move to passwordless across consumer and enterprise environments globally

How a Leading SaaS Company Accelerates Growth Without Compromising Data Privacy
Learn how HelloCSE manages credential risks proactively while supporting rapid company growth.

How We Engineered a Customizable Rules List for Smarter AI Phishing Protection
Dashlane’s AI phishing detection uses a secure, dual allowlist system to combat false positives, ensuring user trust and effective protection against evolving threats.

