Data & Culture
Breaches & Alerts
What the Hack
Visit Our Site
Enterprise security best practices and recent news
Exploring a Safer Future at RSA 2020
Dashlane is once again heading to the RSA Conference, an information security event that connects attendees with industry leaders and innovative technologies (like Dashlane!). This...
9 Cybersecurity Podcasts Business Leaders Should Listen To
Make sure you’re aware of the latest security trends in your industry. Podcasts have grown from a niche format to a popular and entertaining media platform...
Do Biometric Technologies Eliminate the Need for Passwords?
Find out if Face ID and Touch ID will make the world move beyond the password. Face ID. Fingerprint biometrics. Access to a device through...
Protect Your Data When a Third-Party Website Gets Hacked
Learn how to quarantine compromised data when a trusted partner is attacked. When a high-profile data breach occurs, people aren’t necessarily worried about the company...
Security Conferences Provide Great Benefits for Business Leaders
Decision-makers need to be up-to-date on the latest cybersecurity risks. Trade shows are an important part of almost every industry. These events provide crucial networking...
As Elections Near, Trouble Brews for SMB Security
Many SMB executives feel they are prime targets for foreign attackers who wish to wage cyber war and breach national security. In the current climate,...
Think Beyond IT When Assessing Cybersecurity Risks
Hackers don’t limit themselves to technical exploits—and neither should you. Despite the implications of its name, cybersecurity is more than just an IT issue. Some...
Can You Trust Your Web Browser With Your Passwords?
Learn about the advantages and drawbacks of letting your browser store your passwords. Google Chrome, Firefox, and Safari allow users to store their passwords using...
Password Management in the Age of Data Privacy
Service providers have to be careful about how they capture user data. The internet will not be secure until every user enjoys guaranteed data privacy....
Don’t Fall Victim to Password Mistakes in the Office
Employees often have these five misconceptions when choosing passwords for work. Strong password creation is a necessity in the workplace, yet a vast number of...
Ensure Password Security for Remote Workers
Balance connectivity and security in your password management policy. How many of your employees share passwords with one another? At first, you might want to...
Password Manager Storage: Cloud vs. Local
Discover the pros and cons of each storage medium for security application. Most people would assume that if you want to keep something safe, you...
The Importance of End-User Experience in Selecting Password Management Tools
IT leaders need to prioritize the end-user experience when it comes to security software. It’s a well-known fact that an organization’s security chain is only...
Sharing Passwords Through Slack Is Risky
Make sure your employees know how to identify a secure channel for password sharing. Securely sharing a password is no easy task. Organizations that enforce...
Size Doesn’t Matter: Cybercriminals Target Small & Mid-Size Businesses
Although major data breaches make headlines, smaller companies are at a larger risk. Yahoo. Equifax. Marriott. High-profile data breaches involving hundreds of millions of users...
Security Management Terms Explained: A Cybersecurity Glossary
Make sure your entire team is on the same page when it comes to cybersecurity. Acronyms and buzzwords frequently pop up in conversations among IT...
Secure Executive Support for Password Management Tool Adoption
Find out how to bring corporate leadership onboard with modern security. Convincing leadership to make changes for the organization you work for requires hefty effort...
Reduce Employee Involvement in Cybercriminal Activity
Use encryption the right way and keep employees vigilant. Ask any IT professional to describe who their cybersecurity policy defends against, and they will likely...
Password Security Breaches: Biggest Concern for IT Leaders
Password security exploits are among the easiest for cybercriminals. The password security breach. It’s the simplest exploit in the book. The first thing any cybercriminal...
Data Breach E-Book: How to Empower Employees and Protect Your Business
Are you worried about a data breach at your organization? You should be. But you should also be able to rest easy knowing you put...
Security + Convenience: Why Your Business Needs a Password Manager
Data breach! The phrase itself is enough to make even the most seasoned IT or security professional cringe. Hackers who exploit weaknesses in your security...
Data Breaches and Weak Passwords: A Love Story
Data breaches and malware attacks make headlines every day – and huge, household names are no longer the sole target. Small and mid-sized businesses are...
How to Run an Effective Phishing Test at Work
Running an effective phishing test at work can be the difference between an employee who clicks on malicious links or attachments and one who reports...
AI Enters the Business World – How Will it Impact Your Cybersecurity?
Artificial Intelligence, in all of its forms, is here to stay. Any process a machine takes over can be considered AI. In this case, we'll...