Most Recent Posts

Traveling Soon? Add These 5 Cybersecurity Essentials to Your Packing List.
With wider vaccine availability and country borders opening up, many of us are packing our bags. Here’s why you shouldn’t leave cybersecurity at home.

You Asked, A Hacker Answered: 7 Questions With Rachel Tobac
Social engineering expert and white-hat hacker Rachel Tobac tells us just how cautious we should be online.

Suiting Up for ISO 27001 Certification—Simplified
Infosec leader Naya Moss breaks down the key steps to prepare for a process that can be intimidating to many: ISO 27001 certification for your business.

Marketers, Here’s How—and Why—You Should Be Managing Your Team’s Passwords
Managing team passwords can be an overwhelming task. So how do you make logins simpler for you and your team and create secure business passwords?

From Maiden Names to School Mascots—The Best Ways to Use Security Questions
Security questions might not be the most effective method of securing access points, but you can learn tips and tricks for making the most of them.

Train Dashlane: Our Industry-First Feature Gives You Customized Autofill Accuracy and Control
Our new autofill customization settings give you a simple way to tell Dashlane to either stop autofilling on a certain form or to ask it to autofill something else.

3 Times a Major Tech Company Was Hacked—And What Marketing Teams Can Learn
What can your marketing team learn from the Twitter, Facebook, and Canva data breaches?

Why Your Marketing Team Needs a Password Manager
Our technology and marketing experts use password managers every day. Learn how Dashlane is here to assist you in your technology and security needs.

Uncharted Digital Waters: How Private Are Telehealth Platforms?
Since the start of the pandemic, telehealth platforms have been more necessary than ever. But are they a target for cybercriminals?

3 Strategies to Prevent Breaches and Hacks at Work
Here are the three essential strategies for preventing data breaches and hacks, and other ways to enact damage control.

3 Key Steps to Building a Compliance Training Program
Guest contributor Naya Moss is an IT pro and infosec leader breaking down the basics of creating your own compliance training.

A Deep Dive into Web Extension Security
A few months back we shared some insights about the security of our web extension and explained our approach to security on the web platform. In this article, we’d like to go one step deeper and help clarify that our web-first experience is much more than a web app, and highlight a few risk scenarios we evaluate […]