Most recent posts

SaaS Sprawl: How to Manage Shadow IT and Unsanctioned Apps
SaaS sprawl creates security blind spots IT teams can’t afford. Learn how to detect unsanctioned apps, run a SaaS audit, and regain access control.

What Makes a Web Page Feel Trustworthy?
Inside Dashlane’s AI anti-phishing: how interpretable models analyze webpage structure and behavior to detect modern phishing attacks

Link Sharing: How We Built Secure Credential Sharing Without Seeing Your Data
Get a technical deep dive into Dashlane’s end-to-end encryption (E2EE) architecture for external credential sharing.

Beyond SSO: Dashlane’s CEO on Real-Time Credential Protection in the AI Era
Dashlane CEO John Bennett explains how AI is changing phishing and credential risk, as well as what security teams must do to stay ahead.
Workplace Tips

SaaS Sprawl: How to Manage Shadow IT and Unsanctioned Apps
SaaS sprawl creates security blind spots IT teams can’t afford. Learn how to detect unsanctioned apps, run a SaaS audit, and regain access control.








