In the wide world of apps, Pokémon GO is the latest craze. According to DMR, it took this app only 13 hours after launch to make its way to the top of the chart of highest-grossing apps in the United States. In many cases, users were so excited to get started with Pokémon GO that they
Continue Reading →
From the pre-game motivational chat to the first day of school pep talk, as parents, we often have special chats with our children to make sure they’re prepared to manage any challenge or obstacle that lies ahead.
The same holds true when parents want to sit down and have “The Tech Talk” with their kids. “The Tech Talk” should be a series of open dialogues with your children about how to protect their tech gadgets, learning together about new apps and websites, and offering advice on how to properly manage their digital footprints.Continue Reading →
Collaboration tools and apps have made the world a smaller place, allowing for real-time connectivity and electronic file sharing between anyone with internet access, from anywhere in the world, via computer, tablet, or smartphone. These capabilities have effectively changed the way organizations conduct business, streamlining tasks and projects that would otherwise require manual processes and, in many cases, take significantly longer to complete. However, with the benefits of connectivity comes the inevitable risk of enterprise security issues and data breaches.Continue Reading →
As a parent, you want to make sure that your kids are fully prepared before the first day of school. Aside from clothes, shoes, and school supplies, a brand-new laptop or smartphone might be on your back-to-school shopping list. Before you purchase that laptop or smartphone for your child, take a look at our list of the top ten most popular kids’ websites with safe password practices. Continue Reading →
Security at Dashlane has always been a very strong focus of our Engineering team. As a leading password manager, Dashlane is responsible for the safety of the data of millions of users. In order to protect our user’s’ data, we take security into account at every stage of our software development, including the design of our architecture, coding and code reviews, tests, and security audits; security is also a major factor in our product specification, design, communication, and documentation.Continue Reading →