Most Recent Posts

How to Spot a Phishing Scam
Sometimes it’s obvious. That message from a Nigerian prince requesting you wire $2,000? Ok, probably not going to fall for that one. If the CEO of your company asks for your credit card information via email? Something is definitely off. But often phishing is harder to spot. Phishing is a common scheme in which someone […]

Size Doesn’t Matter: Cybercriminals Target Small & Mid-Size Businesses
Although major data breaches make headlines, smaller companies are at a larger risk. Yahoo. Equifax. Marriott. High-profile data breaches involving hundreds of millions of users have become regular occurrences, and their frequency is increasing. However, more data breaches happen every day than anyone can reliably count, and it’s because they’re happening to organizations that aren’t […]

Dashlane Ranks Among Fastest Growing Companies in North America on Deloitte’s 2019 Technology Fast 500™ for Third Consecutive Year
NEW YORK, November 7, 2019 — Dashlane today announced it ranked on Deloitte’s Technology Fast 500™, a ranking of the 500 fastest growing technology, media, telecommunications, life sciences and energy tech companies in North America now in its 25th year. On a path to define the future of digital identity protection and optimize life online, […]

Continuous Delivery: The Good, the Bad, and the Ugly
I was recently invited to speak at UXDX in Dublin on the topic of continuous delivery and how it impacts product delivery At Dashlane we have invested heavily in improving our engineering practices, aiming for painless, fast, and reliable releases. This is an ongoing investment with no target destination, focused on continuously getting better. Here […]

Security Management Terms Explained: A Cybersecurity Glossary
Make sure your entire team is on the same page when it comes to cybersecurity. Acronyms and buzzwords frequently pop up in conversations among IT professionals, but the downside of using this industry-specific terminology is that it’s an opportunity for the non-initiated to lose track. Until recently, this has not been much of a problem […]

Secure Executive Support for Password Management Tool Adoption
Find out how to bring corporate leadership onboard with modern security. Convincing leadership to make changes for the organization you work for requires hefty effort – but it’s worth it. Those changes might be what helps your business remain competitive in the long run. In today’s digital-first environment, there are no changes more urgent than […]

What If Dashlane Gets Hacked?
If Dashlane were ever hacked, your information would still be safe thanks to encryption. Here’s why.

Dashlane Will Support Google’s Pixel 4 Face Unlock
The much-hyped Pixel 4 ships next week with a brand new security feature, face unlock authentication. Dashlane users who get the phone will now be able to use Google’s facial recognition for an even more seamless login experience. Gone are the days when iris scanning only existed in sci-fi movies. That technology is already here—and […]

Hiring Tips for First-Time Engineering Managers
The difficulty of hiring engineers has become so pervasive that it has evolved into a tech zeitgeist. And while my previous role as a Team Lead gave me some context to the scope of the hiring challenge, it wasn’t until I joined Dashlane as a full-time Engineering Manager that I understood how dramatically my priorities […]

Dashlane on Android: Retrieve SMS Codes with One Click
At Dashlane, we continuously work to bridge the gap between convenience and security, across the full spectrum of operating systems, devices, and browsers. That means building features that operate natively within each operating system, so our customers don’t have to do any heavy lifting – just enable the feature and dash online. In that vein, […]

Reduce Employee Involvement in Cybercriminal Activity
Use encryption the right way and keep employees vigilant. Ask any IT professional to describe who their cybersecurity policy defends against, and they will likely describe a hacker. The hacker is a smart, opportunistic cybercriminal ready to capitalize on your security weaknesses by using sophisticated technology and nefarious social engineering tactics. And data shows fear […]

Password Security Breaches: Biggest Concern for IT Leaders
Password security exploits are among the easiest for cybercriminals. The password security breach. It’s the simplest exploit in the book. The first thing any cybercriminal does when breaking into a system is try some popular passwords. IT leaders and cybersecurity researchers are routinely amazed to find out just how far hackers can go with nothing […]