Resources, digital security tips, and product news from your expert cybersecurity partners at Dashlane
Here’s how Dashlane is transitioning from Manifest V2 to Manifest V3, a new architecture model for Chrome extensions that improves security.
JD Sherman and Dashlane welcome John Bennett as the new Chief Executive Officer. Bennett brings over 30 years of experience leading high-growth B2B SaaS and communication companies.
A small business cybersecurity plan details how to protect an organization from cyber threats, including using password managers to safeguard company data.
Here’s a breakdown of the significant security breaches so far in 2023: LastPass, Norton LifeLock, Twitter, Mailchimp, FanDuel, and T-Mobile.
AI chatbots like ChatGPT can help automate some tasks and ultimately impact jobs, but don’t worry about finding a new career. Not yet.
As user requirements for security, convenience, and compatibility evolve, the need for secure passwords is greater than ever in 2023.
A small business cybersecurity plan details how to protect an organization from cyber threats, including using password managers to safeguard company data.
Learn more about the fundamentals of cybersecurity from AES to zero trust with this helpful glossary and downloadable guide.
Learn how password practices have evolved and what to do to protect your organization.
This glossary of key terms will help you get a handle on what to watch out for when it comes to cyber threats and attacks.
Case Study:
Learn how RevGenius, an online community for sales, marketing, and other professionals, simplified processes with Dashlane.
Case Study: Learn how Finder discovered the most human-centric & secure password management solution for their workplace.
A lump grew in my throat. I’d been conned. More specifically, I’d been phished. And it had nothing to do with the band.
What might be the only thing more frustrating than getting juice jacked? Being the first documented case of it.
What a VPN does is make you anonymous, mysterious, private—masking your location and your data and your browsing activity.
Brute-force attacks are like when you spend five minutes jamming the wrong key into your front door, hoping it might finally work.
Imagine your keyboard gossiping behind your back, spilling your deepest, darkest, and most embarrassing secrets to the world.
If you want to remember the concept behind dead man’s switch, just think of legendary character actor Joe Morton.