Blog
-
Identity Security
Understanding ISPM: Closing the Identity Gap with Identity Security Posture Management
ISPM is a new category of identity security designed to help organizations continuously monitor and manage identity risk across cloud, SaaS, and hybrid environments. Learn how Identity Security Posture Management works, why it matters, and how Veza enables it. -
AI
Veza Access AI – Applications of Gen AI for Identity Security Use Cases
Veza Access AI transforms identity security by enabling natural language queries to navigate complex access landscapes, empowering organizations to achieve least privilege effectively.
Explore our posts
-
Automated Access Revocation & Remediation at Scale
Learn more -
Veza for HashiCorp Vault: Bringing least privilege to Vault and Secrets
Learn more -
Separation of Duties: Combating Toxic Combinations with SoD Controls
Learn more -
IBM Cost of a Data Breach Report: AI Security Cost Reduction
Learn more -
Identity governance in the cloud era
Learn more -
Securing Snowflake: A CISO’s Guide to Effective Access Control
Learn more
-
Identity Security Posture Management
Learn more -
The MIGHT of Veza
Learn more -
Veza welcomes Mike Towers as Chief Security & Trust Officer
Learn more -
Identity Security Spotlight: Cisco announces “Identity Intelligence”
Learn more -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence
Learn more -
The year of Intelligent Access
Learn more
-
How Does Veza Support the Identity Visibility and Intelligence Platform (IVIP) Model?
Learn more -
Identity Is the Entry Point: How UNC3944 Breached vSphere Without Malware
Learn more -
Inside Gartner’s 2025 Hype Cycle for Digital Identity: Why IVIP and AI for Access Matter Now
Learn more -
Identity Attack Surface Analysis: Securing the New Perimeter
Learn more -
12 Best Identity Security Software [2025]
Learn more
-
How AI Is Reshaping Identity Security: Opportunities and New Threats
Learn more -
The Hidden Cost of Over-Provisioned Access: Identity’s Role in Cloud Optimization
Learn more -
Identity is the New Security Perimeter
Learn more -
The Trust Dividend: How Security Leaders Build Enterprise Value
Learn more -
From Exposed to Reinvention-Ready: Why Identity Security Is the Foundation of AI Resilience
Learn more
-
I Attended the Verizon Data Breach Session at RSA So You Don’t Have To:
Learn more -
Reflections from Gartner IAM London: Visibility Leads to Observability
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
Join us at Black Hat USA August 3 – 8, 2024
Learn more -
Join us at RSAC May 6-9, 2024
Learn more -
Veza @ AWS re:Invent
Learn more
-
What is Cloud Identity Security? Key Considerations
Learn more -
How AI is impacting identity security and privileged access management in 2025
Learn more -
How Does Veza Support the Identity Visibility and Intelligence Platform (IVIP) Model?
Learn more -
The Hidden Cost of Over-Provisioned Access: Identity’s Role in Cloud Optimization
Learn more -
Unlocking App Onboarding at Scale: The Power of Veza’s 300+ Integrations and Open Authorization API (OAA)
Learn more