Blog
-
Identity Security
Understanding ISPM: Closing the Identity Gap with Identity Security Posture Management
ISPM is a new category of identity security designed to help organizations continuously monitor and manage identity risk across cloud, SaaS, and hybrid environments. Learn how Identity Security Posture Management works, why it matters, and how Veza enables it. -
AI
Veza Access AI – Applications of Gen AI for Identity Security Use Cases
Veza Access AI transforms identity security by enabling natural language queries to navigate complex access landscapes, empowering organizations to achieve least privilege effectively.
Explore our posts
-
Data Security: The Challenge of Securing Service Accounts
Learn more -
Why I’m excited about the future of Veza
Learn more -
Introducing Veza — Our Quest to Advance the Data Security Industry for Decades to Come
Learn more -
What Least Privilege Means in Practice
Learn more -
Why it’s Important to Understand Effective Permissions
Learn more
-
Unlocking App Onboarding at Scale: The Power of Veza’s 300+ Integrations and Open Authorization API (OAA)
Learn more -
Veza Product Updates – May
Learn more -
Veza Product Updates – April
Learn more -
Announcing Veza’s Series D: Securing Identities through Achieving Least Privilege
Learn more -
Veza Product Updates – March
Learn more -
Veza Product Updates – February
Learn more
-
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
What is NIST Compliance? Guide & Checklist [2025]
Learn more -
Modern Access Request Processes: Best Practices & What to Avoid in 2025
Learn more -
Simplifying Security: The Power of Effective Access Control in Cybersecurity
Learn more -
Automated Access Revocation & Remediation at Scale
Learn more
-
Snowflake Roles Best Practices: Steps to Least Privilege
Learn more -
AWS Guide: Access Governance, Security, Compliance & Roles [2024]
Learn more -
What is non-human identity management
Learn more -
Can you make sense of permissions in AWS?
Learn more -
The Principle of Least Privilege Explained
Learn more
-
The Hidden Cost of Over-Provisioned Access: Identity’s Role in Cloud Optimization
Learn more -
Identity is the New Security Perimeter
Learn more -
The Trust Dividend: How Security Leaders Build Enterprise Value
Learn more -
From Exposed to Reinvention-Ready: Why Identity Security Is the Foundation of AI Resilience
Learn more -
Identity Crisis: The Rise of Machines
Learn more
-
I Attended the Verizon Data Breach Session at RSA So You Don’t Have To:
Learn more -
Reflections from Gartner IAM London: Visibility Leads to Observability
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
Join us at Black Hat USA August 3 – 8, 2024
Learn more -
Join us at RSAC May 6-9, 2024
Learn more -
Veza @ AWS re:Invent
Learn more
-
The Hidden Cost of Over-Provisioned Access: Identity’s Role in Cloud Optimization
Learn more -
Unlocking App Onboarding at Scale: The Power of Veza’s 300+ Integrations and Open Authorization API (OAA)
Learn more -
Identity Is the Entry Point: How UNC3944 Breached vSphere Without Malware
Learn more -
Identity is the New Security Perimeter
Learn more -
7 user access review software tools to know in 2025
Learn more