Explore our posts
-
Non-Human Identity Security: A Practical Guide to Mitigating Risk
Learn more -
Going Beyond Provisioning and Deprovisioning with Veza Lifecycle Management
Learn more -
Veza Product Updates – September 2024
Learn more -
Simplifying Security: The Power of Effective Access Control in Cybersecurity
Learn more -
Risk scoring in Identity Security
Learn more -
Charting a Path for the Future of Identity Security
Learn more
-
Simplifying Security: The Power of Effective Access Control in Cybersecurity
Learn more -
Veza’s Automated Access Revocation and Access Remediation
Learn more -
Securing Snowflake: A CISO’s Guide to Effective Access Control
Learn more -
Introducing Access AI: The Future of Identity Security
Learn more -
What is SaaS Sprawl?
Learn more
-
Charting a Path for the Future of Identity Security
Learn more -
Identity Radicals: Identity governance in the cloud era
Learn more -
Identity Security Posture Management
Learn more -
Decoding Data Sovereignty with Jenner Holden | Ep 3
Learn more -
Disrupting Breaches and Advancing InfoSec with David Tyburski | Ep 2
Learn more -
Identity Targeting: A Growing Threat with Rachel Wilson | Ep 1
Learn more
-
Join us at Black Hat USA August 3 – 8, 2024
Learn more -
Join us at RSAC May 6-9, 2024
Learn more -
Veza @ AWS re:Invent
Learn more -
Six takeaways from the Gartner IT Symposium 2023
Learn more -
Veza @ Gartner Symposium — October 15-19
Learn more -
Join Us at Oktane: Explore “Bad Permissions” and Veza’s Access Solutions
Learn more
No results found.
-
Why I’m excited about the future of Veza
Learn more -
Introducing Veza — Our Quest to Advance the Data Security Industry for Decades to Come
Learn more -
What Least Privilege Means in Practice
Learn more -
Why it’s Important to Understand Effective Permissions
Learn more -
Security’s Next Frontier – Modernizing Data Security through Authorization for a Cloud-First Future
Learn more