Breaches & Alerts
Data & Culture
Internet Safety 101
Product News & Tips
Visit Our Site
Workplace security best practices and recent news
How to Get Perfect UX by Setting Up Your Forms for Dashlane
Learn this tiny change you can make to your website for faster and even more reliable Dashlane integration.
What to Do If Your Company’s Been Hacked or Breached
When it comes to hacks or breaches at your business, the quicker you act, the better. Here’s everything you need to do if you experience...
Executive Order on Cybersecurity Names Password Managers Critical Software—What It Means for Your Business
After a recent executive order on cybersecurity, federal government now views password managers as critical to endpoint security—and you should, too.
Create a Culture of Cybersecurity: Teach Employees to “Catch a Phish”
At the end of the day, negative emotions won’t help you build an effective culture of cybersecurity awareness. HR departments should make it their goal...
What Is a Human-Centric Security Culture?
IT pro and infosec leader Naya Moss breaks down the basics of human-centric cybersecurity.
The 7 Steps of a Cyberattack—And How to Prevent Them
Here, we break down the anatomy of cyberattacks and compare outcomes between companies with and without security solutions in place.
Cybersecurity Journalist Nicole Perlroth on How to Protect Your Data Amid a Global Cyber Arms Race
The New York Times journalist and author of "This Is How They Tell Me The World Ends" shares her predictions for the future and life-saving...
Highlights From Our First Business Customer Town Hall
We shared a look at some of our product plans and recent enhancements, including a demo of our new machine learning autofill.
6 Cybersecurity Threats That Lead to Business Breaches and Hacks
These are the most common threats to look out for so your company can prevent cybersecurity incidents.
The 3 Most Important Aspects of Company Cybersecurity
When it comes to cybersecurity in business, the 3 most important aspects are employees, tech, and processes.
Data Breach or Hack? Know the Difference.
We tend to use the terms interchangeably, but it’s important to know how to protect your company against both types of cyberattacks.
The 4 Security Personalities You’ll Meet At Work
There are four main ways employees approach cybersecurity. Here’s what you can expect from each approach.
Solving the Human Security Problem: An Interview With JD Sherman, Dashlane CEO
JD Sherman reflects on the future of workplace security. "The challenge is security is not just a technology problem," he says, "it’s a human problem."
Why Every Employee Device Should Be Secured
Working from home means even more screen time than before. Here’s how to keep each screen safe and secure.
What a Year of Working From Home Taught Us About Cybersecurity and 3 Predictions for What’s Next
Ahead of the transition out of WFH, we surveyed 1,000 U.S. employees about their online habits and their relationship with tech as it relates to...
Password Managers and IAM Are the Ultimate Duo for Protecting Data
Identity and access management (IAM) is critical for guarding business data; password managers add even more protection so you’ll know your data is truly secure.
Top 5 Benefits and 3 Challenges of Implementing Identity and Access Management
Cybersecurity risks are on the rise, especially when it comes to data-driven companies. Identity and Access Management (IAM) can help.
Clubhouse Is Exclusive, But Are the Privacy Risks Worth It?
Clubhouse, the popular audio-based social media platform has come under scrutiny for its privacy policies and most recently for its large-scale data exposure. So should...
How to Conduct Your Own Internal Security Audit
Want to conduct a security audit of your company but don't know where to start? Here are five straightforward steps to follow.
IAM: 3 Letters That Will Drastically Improve Your Company’s Security
Uncover security vulnerabilities at your company and much more with this automated tool—a pandemic essential.
This Is How You Build a Security-First Culture at Your Company
For IT admins, keeping tabs on employee passwords can seem daunting, but Dashlane has the tools to make it simple. Once you’ve identified weak passwords...
Case Study: How Sheehan Nagle Hartray Architects Levels Up Security With Dashlane
Sheehan Nagle Hartray Architects (SNHA) is a leading full-service architectural firm that, until recently, was faced with several cybersecurity challenges—particularly poor password habits. That’s where...
It’s Time to Start Using These Two Essential Dashlane Features
With a password manager, IT admins don’t need to spend all day thinking about and updating passwords or searching for places where they may have...
3.2 Billion Reasons Why Your Business Needs a Password Manager
In an earlier post, we gave you 68,680,741 reasons why you need an automated password manager to better secure your business. As cybersecurity threats and...