Most Recent Posts

8 IoT Risks Every Organization Needs to Be Aware Of
Discover 8 key IoT risks, from data breaches to malware, and learn how to protect your business with strong IoT security strategies.

What to Expect in 2025: 6 Tech Predictions from Dashlane Leaders
Three seasoned Dashlane security leaders share their tech predictions for 2025, from AI to passkeys to confidential computing.

Q&A with Dashlane’s CTO: How Security Leaders Can Address Major Causes of Breaches
Dashlane CTO Frederic Rivain shares his thoughts on how security leaders can achieve more proactive security, what gives him hope, and other insights.

6 Risks of Using Outdated Technology at Home
Discover the risks of outdated technology at home and learn best practices to keep your personal devices secure and running efficiently.

Passkeys Explained: 7 Passkey Myths Busted by Dashlane’s Head of Innovation
Dashlane’s Director of Product Engineering and Innovation busts common myths about passkey security and usage and provides the truth.

2024 Security Report Card: The 5 Industries With the Highest and Lowest Scores
Dashlane’s Global Password Health Report examines industries with both high and low security scores and explores the details behind these rankings.

5 Common SSO Integrations to Consider Before Choosing a Solution
Discover the top 5 single sign-on (SSO) integrations and how they can improve your network’s security and facilitate a better user experience.

5 Machine-to-Machine (M2M) Applications & Use Cases
Explore the benefits, applications, and security challenges of machine-to-machine (M2M) technology across industries.

Pushing Zero-Knowledge Boundaries With Confidential Computing
Customer data security and privacy have always been at the heart of Dashlane. Our core security principle is our zero-knowledge architecture, which ensures nobody can access your data except you. This feels simple, but it’s actually pretty complex to implement in a product like Dashlane. Our security white paper goes into details about how we […]

How SSH Keys Can Transform Your Organization’s Security
Securing SSH keys is crucial for your organization’s security. Learn best practices to prevent unauthorized access, ensure data integrity, and protect your network.