This post is also available in: French, German, Portuguese (Brazil)

Making security simple for people and businesses everywhere

Resources, digital security tips, and product news from your expert cybersecurity partners at Dashlane

Most Recent Posts

Learn more about the fundamentals of cybersecurity from AES to zero trust with this helpful glossary and downloadable guide.

Review the features and plans of the leading password managers to perform a thoughtful password manager comparison.

How often should you change your password? Smart password security habits and password managers are making preset interval changes obsolete.

Learn how password practices have evolved and what to do to protect your organization.

Here’s what Twitter’s significant security breach means for 200 million users and what you can do if you were affected.

Learn how to switch to Dashlane from 1Password, Bitwarden, LastPass, KeePass, and Keeper, as well as 5 internet browsers.

Workplace Tips

Learn more about the fundamentals of cybersecurity from AES to zero trust with this helpful glossary and downloadable guide.

Learn how password practices have evolved and what to do to protect your organization.

This glossary of key terms will help you get a handle on what to watch out for when it comes to cyber threats and attacks.

Case Study:
Learn how RevGenius, an online community for sales, marketing, and other professionals, simplified processes with Dashlane.

Case Study: Learn how Finder discovered the most human-centric & secure password management solution for their workplace.

Identity and Access Management can take care of tedious security tasks and free up IT admins’ time. Here are some of the key terms surrounding IAM.

What the Hack

Phishing attempt with fishing lure

A lump grew in my throat. I’d been conned. More specifically, I’d been phished. And it had nothing to do with the band.

Juice jacking USB devices

What might be the only thing more frustrating than getting juice jacked? Being the first documented case of it.

Internet user disguised while using VPN

What a VPN does is make you anonymous, mysterious, private—masking your location and your data and your browsing activity.

Laptop experiencing a brute force attack

Brute-force attacks are like when you spend five minutes jamming the wrong key into your front door, hoping it might finally work.

Camera focusing on keyboard

Imagine your keyboard gossiping behind your back, spilling your deepest, darkest, and most embarrassing secrets to the world.

""

If you want to remember the concept behind dead man’s switch, just think of legendary character actor Joe Morton.