Blog
-
AIVeza – The Enterprise Agent Identity Control Plane
Veza’s 2026 State of Identity and Access Report found that in a typical enterprise, an average worker holds 96,000 entitlements, 38% of IdP accounts are dormant and only 55% of permissions are safe and compliant. The volume and complexity of identity-based attacks is exacerbated by the explosion of AI agents and non-human identities (NHIs). In […] -
CompanyServiceNow + Veza: A new chapter in identity security
Today marks a pivotal moment—not just for Veza, but for the entire identity security industry. I’m deeply proud to share that ServiceNow has signed a definitive agreement to acquire Veza. Together, we will accelerate the mission to secure identity across the modern enterprise as organizations transition into the era of agentic identities. When Maohua, Rob, […]
Explore our posts
-

7 user access review software tools to know in 2025
Learn more -

Understanding ISPM: Closing the Identity Gap with Identity Security Posture Management
Learn more -

Veza for Oracle Applications: Solving the Access Management Puzzle
Learn more -

Identity Attack Surface Analysis: Securing the New Perimeter
Learn more
No results found.
-

The SharePoint Blind Spot: How Legacy IGA Failed to Stop Volt Typhoon
Learn more -

Overcoming Identity Silos: Toward Unified Identity Security
Learn more -

The Security Paradox of Data and Digital Transformation
Learn more -

How AI Is Reshaping Identity Security: Opportunities and New Threats
Learn more -

The Hidden Cost of Over-Provisioned Access: Identity’s Role in Cloud Optimization
Learn more -

Identity is the New Security Perimeter
Learn more
-

I Attended the Verizon Data Breach Session at RSA So You Don’t Have To:
Learn more -

Reflections from Gartner IAM London: Visibility Leads to Observability
Learn more -

Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -

Join us at Black Hat USA August 3 – 8, 2024
Learn more -

Join us at RSAC May 6-9, 2024
Learn more -

Veza @ AWS re:Invent
Learn more
-

Reflections from Gartner IAM London: Visibility Leads to Observability
Learn more -

GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It
Learn more -

Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -

How Veza Simplifies SOX Compliance: Automating Access Controls & SoD Monitoring
Learn more -

The Evolution of Identity and Security at Workday: Insights from CISO Josh DeFigueiredo
Learn more -

What is NIST Compliance? Guide & Checklist [2025]
Learn more


























