Explore our posts
-
Harnessing the Power of AI: Identity Security as a Key Enabler
Learn more -
What is IGA (Identity Governance & Administration)?
Learn more -
Announcing The State of Access 2024
Learn more -
The Veza Voice – Q1 2025
Learn more -
Identity Security Spotlight: Ransomware attack on Ascension
Learn more -
The Imperative for Identity Security: A Call to Action for the Industry
Learn more
-
Identity Security Posture Management
Learn more -
The MIGHT of Veza
Learn more -
Veza welcomes Mike Towers as Chief Security & Trust Officer
Learn more -
Identity Security Spotlight: Cisco announces “Identity Intelligence”
Learn more -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence
Learn more -
The year of Intelligent Access
Learn more
-
Achieving Least Privilege at Scale: How OPAS Helps Enterprises Reduce Hidden Access Risks
Learn more -
Trust as the Foundation for Agentic AI Architecture: Securing Access to all the AI layers – Models, Infra, AI Applications
Learn more -
How Veza Strengthens SOC 1 Compliance: Common Control Failures & How to Fix Them
Learn more -
Model Context Protocol (MCP): Implications on identity security and access risks for modern AI-powered apps
Learn more -
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It
Learn more
-
Achieving Least Privilege at Scale: How OPAS Helps Enterprises Reduce Hidden Access Risks
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security
Learn more -
Principle of Least Privilege Explained: Best Practices
Learn more -
Snowflake Roles Best Practices: Steps to Least Privilege
Learn more -
AWS Guide: Access Governance, Security, Compliance & Roles [2024]
Learn more
-
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
The Evolution of Identity and Security at Workday: Insights from CISO Josh DeFigueiredo
Learn more -
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation
Learn more -
The Five Tenets of Next-Gen IGA
Learn more -
Posture of Access, 3 Pillars of Least Privilege
Learn more
-
Guide to Non-Human Identity Security
Learn more -
The Five Tenets of Next-Gen IGA
Learn more -
10 top privileged access management (PAM) software solutions for 2025
Learn more -
Veza Product Updates – December 2024
Learn more -
8 Ways AI is Transforming Access Control in 2025
Learn more -
Demonstrating PCI DSS 4.0 Compliance with Veza’s Identity Security Platform
Learn more