Security

End-to-End Cybersecurity Q&A with Davison Paull and Mike Maletsky
Davison Paull and Mike Maletsky answer questions about their cybersecurity career journeys, today’s cyber threats, and major industry shifts.

Keep Your Dashlane Account Safe with a Recovery Key
Dashlane now offers simple, secure account recovery for all users who log in with a Master Password.

A Complete Guide to Managing Technology Risk at the Enterprise Level
Technological risk management deploys risk assessments, policies, and technology to protect company systems, processes, and data. Learn more.

What Many Recent Data Breaches Have in Common
What are the common causes of data breaches? Most can be traced to human factors like weak passwords and social engineering attacks.

Excel Spreadsheets: How to Password Protect Your Excel Files
Learn how to password-protect Excel files to secure sensitive business data and formulas with our detailed guide.

Security Terms 101: What Zero-Knowledge Architecture, Encryption, and More Really Mean
Learn more about industry terms such as zero-knowledge, encryption, key derivation functions, confidential computing, zero-trust, and more.

Protect Your Online Business at Any Stage: A Guide for Digital Entrepreneurs
If you’re an owner of a small, digital-first business, follow these security best practices to protect your logins and secure online assets.

Are Digital Wallets Safe?
Digital wallets let you complete purchases simply by autofilling or tapping your device at the point of sale. But are digital wallets safe?

Balancing Usability & Security in a Remote Office
Balancing usability and security can be difficult for remote and hybrid workers, but some simple cybersecurity tools and practices can help.

What You Should Know about Dashlane’s Patented Security Architecture
Dashlane’s security architecture uses the best technology available to protect everything in your vault.