Most Recent Posts

The 7 Steps of a Cyberattack
Here, we break down the anatomy of cyberattacks and compare outcomes between companies with and without security solutions in place.

Easier Onboarding and Other Updates for You and Your Business
Dashlane’s new product updates include an onboarding invite link, categories for organization, and a streamlined way to import data.

How to Find & Manage All Your Online Accounts
How can I find all my online accounts? Here’s the best way to recover all old accounts and keep them safe and accessible.

From MV2 to MV3: What to Expect From Dashlane’s MV3 Web Extension
You might have heard that we’re approaching one of the most impactful architectural changes in the world of web extensions. Web browser makers, including Google, are introducing Manifest Version 3 (MV3) to ensure that the extension ecosystem remains secure and scalable and has the potential to extend beyond desktop environments. The 3 pillars of MV3 […]

Top 8 Most Important Passwords to Change
Our most important passwords, like those for email and banking retail accounts, can be protected by safe password habits and a password manager.

Dashlane and the Reddit Password Manager Community
Read what Redditors have to say about Dashlane and how Dashlane uses Reddit to provide additional support and hear feedback.

A Complete Guide to Asymmetric Encryption: Definition & Uses
Asymmetric encryption is a powerful tool used for many everyday online transactions and communications, like messaging and email.

What I’ve Learned From My Time in Traditional and Agile Project Management and Operations Roles
In December 2019, I was offered the opportunity to join Dashlane as an agile project manager. It was an exciting challenge that thrilled me just as much as it made me nervous. I had spent the first 10 years of my professional life working mostly as a “traditional” project manager in the construction industry, so […]

How to Prevent Ransomware Attacks on Your Devices
Ransomware is a growing security threat, but we can prevent ransomware by implementing a few cybersecurity tools and best practices.

IT Security: Your Guide to Common Terms
This final post in our 5-part series discusses common IT security terms. Learn about what it takes to secure personal and business logins.