Proton

Proton blog

Reserve a private email address for your child with Born Private
  • For business
  • Proton news
  • Proton Pass

Latest articles

See all articles
a white animated key icon on a purple square background, surrounded by a fingerprint icon, a person icon, and a shield icon
Learn about passkeys for business, where adoption makes sense, and how to manage passkeys and passwords together during the transition.
a purple animated computer screen with an exclamation mark warning on it, a credit card to its left side, and half obscured password field to the right
Learn what an account takeover is, how it can happen, and how businesses can detect and prevent attacks.
Most companies claim secure file sharing as a selling point, but few can back it up. Here's how to turn it into your competitive edge.
Image of a calendar with product milestones indicated under the Proton ecosystem logo
  • Lumo AI
  • Product updates
  • Proton Calendar
  • Proton Drive
  • Proton Mail
  • Proton Pass
Find out updates and new features you can expect for the Proton ecosystem in the Spring and Summer of 2026.
a purple animated computer screen with three tick icons overlaying a spreadsheet, text says 'proton pass' at the top
  • Product updates
  • Proton Pass
Take a look at the new features we're planning for Proton Pass in spring and summer, and catch up on our latest releases.
a screen showing the new groups feature for proton pass: a group titled 'design team' with four members
You can now organize your team members and simplify team password sharing with groups in Proton Pass. Find out how to create a group
  • For business
  • Proton news
  • Proton Pass
Independent auditors confirmed Proton Pass is exceptionally secure. See why transparency is our strongest security feature.
Andy Yen, Proton founder and CEO, speaking at Security in the Digital Century, part of Semafor World Economy 2026, in Washington, D.C.
Powerful forces are exploiting parents’ fears to strengthen their toxic business models. Here’s how we stop them.
A visual representation of the UI for Proton Meet end-to-end encrypted video conferencing service
  • For business
  • Proton Meet
  • Proton news
Protect the conversations that matter with a secure, end-to-end encrypted video conferencing from Proton.
The Microsoft Edge logo, keys, and a password field, representing how Microsoft Edge keeps all saved passwords unencrypted
  • For business
  • Privacy news
Microsoft Edge keeps all saved passwords in plaintext memory instead of encrypting them. Here’s what you risk and what you should do instead.
A computer screen with the Meta logo in the middle, and an eye symbol, representing how Meta is using employee behavioral data for AI training
  • For business
  • Privacy news
Meta is tracking employees and using behavioral data to train AI while planning layoffs. Are workers helping build their own replacements?
a computer screen with a crossed out american flag in the center with the flags for denmark, norway, sweden and finland in the top right of the screen
We asked 4,000 people in Nordic countries what they think of US tech. Turns out they're not fans.
An envelope, a password field, and a pencil, representing how to change email password
Find out how to change your email password and improve email security on Gmail, Outlook, and Proton Mail, including on iPhone and Android.
A computer screen, an ID, and a lock, representing data anonymization
Anonymized data can still be traced back to you. Here's how companies use it, and how you can protect your privacy.
A phone, a settings symbol, and a progress bar, representing how to clear iPhone cache
Cache accumulates and takes up precious storage space. Here’s how to clear cache on iPhone across browsers, apps, and system data.
Austrian data strategist Fritz Fahringer explains how European businesses can reclaim data sovereignty with everyday tools.
How much are you worth to Google?
Proton analyzed 54,000 profiles using real ad auction data to determine your worth to Google. How valuable is your data?
Andy Yen, Proton founder and CEO, speaking at Security in the Digital Century, part of Semafor World Economy 2026, in Washington, D.C.
Powerful forces are exploiting parents’ fears to strengthen their toxic business models. Here’s how we stop them.
a white animated key icon on a purple square background, surrounded by a fingerprint icon, a person icon, and a shield icon
Learn about passkeys for business, where adoption makes sense, and how to manage passkeys and passwords together during the transition.
a purple animated computer screen with an exclamation mark warning on it, a credit card to its left side, and half obscured password field to the right
Learn what an account takeover is, how it can happen, and how businesses can detect and prevent attacks.
Most companies claim secure file sharing as a selling point, but few can back it up. Here's how to turn it into your competitive edge.