Case Study: How FoodCorps Cultivated and Simplified Their Cybersecurity
Case Study: Learn why U.S. non-profit FoodCorps partnered with Dashlane to simplify login sharing and scale securely.
5 Pros & Cons of a Future Without Passwords
The pros and cons of a future without passwords already impact the user experience, security, IT overhead, device dependency, and adoption.
7 Ways to Determine if You Have a Strong (or Weak) Password
The strong password definition is clear. It’s easy to determine whether you have a strong or weak password and keep it secure using a password manager.
Case Study: How Non-stop dogwear Securely Shares Information Across Five Countries
Case study: Global brand Non-stop dogwear needed a safe way to share passwords across the organization. Dashlane helps them maintain security at scale.
Case Study: Why OOLY pivoted on password management solutions
Case Study: Learn why retail company, OOLY, pivoted password management solutions and improved their collaboration.
How To Prevent and Respond to Data Breaches
Discover how data breaches occur, how to prevent a data breach with best practices and tools, and the steps to recovery after an incident.
What Many Recent Data Breaches Have in Common
What are the common causes of data breaches? Most can be traced to human factors like weak passwords and social engineering attacks.
7 Dangers of Sharing Passwords Without a Password Manager
The dangers of sharing passwords: data breaches, lost credentials, and unwanted access. Mitigate these risks with a secure, encrypted password-sharing portal.
Do You Have These 6 Cybersecurity Basics Down?
Here are 6 basic things you can do to strengthen your personal and professional cybersecurity.
Why Utilities and Energy Providers Need a Password Manager
Why the utilities and energy industry needs to adopt password managers to avoid cybersecurity vulnerabilities in the space.
Stolen Passwords and Ransomware Attacks: What Businesses Can Do Right Now
Password managers are what antivirus software used to be for businesses—mandatory. And they’re a simple way to lock down your credentials, which are the easiest way in for ransomware attackers. The commanding presence of ransomware attacks in the headlines would compel any business leader or IT admin to ask: Could we be next? This cybercrime […]