encryption

How Dashlane Solved the Zero-Knowledge Activity Log Paradox After 12+ Months
Learn how Dashlane used confidential computing and cloud secure enclaves to create zero-knowledge activity logs that are both encrypted and queryable.

How Password Managers Work: A Beginner’s Guide
Learn the basics about password managers, how password managers work, and the features to look for in password management solutions.

Store and Manage Developer Secrets in the Dashlane Vault
Securely store and manage encrypted developer secrets in your Dashlane vault using our new, user-friendly vault item, Secrets.

Putting Security First: How Dashlane Protects Your Data
Learn how Dashlane’s security culture and zero-knowledge architecture are set up to best protect your data.

Dashlane Deepens Senior Leadership Bench to Further Accelerate Strategic Growth and Product Expansion
Dashlane welcomes four experienced security and technical leaders to support its continued growth and expansion of product offerings.

Secure Developer Secrets With Dashlane
Learn about secrets management, why it matters, and how Dashlane can help you easily secure and manage secrets.

What Is Password Hashing?
What is password hashing? Discover how it works, the algorithms it uses, and why it’s crucial for data security.

How to Password Protect Your PDF Files
Learn how to password protect a PDF to improve security and traceability for signed agreements, intellectual property, and other documents.

Security Terms 101: What Zero-Knowledge Architecture, Encryption, and More Really Mean
Learn more about industry terms such as zero-knowledge, encryption, key derivation functions, confidential computing, zero-trust, and more.

A Complete Guide to Asymmetric Encryption: Definition & Uses
Asymmetric encryption is a powerful tool used for many everyday online transactions and communications, like messaging and email.

