Most Recent Posts
Benefits of Artificial Intelligence in Cybersecurity
High data capacity, learning capabilities, impressive threat detection, and an improved UX make AI in cybersecurity a valuable asset.
Passkey Support, Phishing Alerts, and Other Updates We Made in 2023
Passwordless authentication, simplified employee and admin experiences, phishing protection—these are some improvements we made in 2023.
Iterating on the Dashlane Product & Engineering Organization
Dashlane CTO Frederic Rivain discusses the history and evolution of the Dashlane Product & Engineering teams.
Case Study: How FoodCorps Cultivated and Simplified Their Cybersecurity
Case Study: Learn why U.S. non-profit FoodCorps partnered with Dashlane to simplify login sharing and scale securely.
Our Test Management Journey: From Jira Xray to GitLab
Learn why Dashlane moved away from Xray for test management and how we made GitLab work for us.
Why Security Teams Are Important
Security teams are essential for keeping organizations protected from cyberattacks. Learn what to consider when building your own.
How to Know if Your Phone Is Hacked
Learn how to know if your phone is hacked, what to do if your phone is hacked, and take steps to protect your device and personal data.
End-to-End Cybersecurity Tips Q&A with Dashlane Chief Product Officer Donald Hasson and Secureframe Manager of Compliance Marc Rubbinaccio
Dashlane’s Chief Product Officer Donald Hasson and Secureframe’s Marc Rubbinaccio answer your top cybersecurity questions.
Unlocking the Future: A Passkeys Implementation Case Study Based on FIDO UX Guidelines
See how GitHub followed FIDO Alliance’s UX guidelines when implementing passkeys for a clear, user-friendly experience.
Passkeys are Here: 3 Authenticate 2023 Takeaways
As a board member of the FIDO Alliance, Dashlane attended the Authenticate 2023 conference on passkeys and passwordless authentication.
What Is Credential Stuffing and How Can It Impact You?
What is credential stuffing? It’s a hacking tactic that combines stolen credentials with algorithms to maximize data breach effectiveness.