Explore our posts
-
How Veza Simplifies SOX Compliance: Automating Access Controls & SoD Monitoring
Learn more -
The Evolution of Identity and Security at Workday: Insights from CISO Josh DeFigueiredo
Learn more -
What is NIST Compliance? Guide & Checklist [2025]
Learn more -
Modern Access Request Processes: Best Practices & What to Avoid in 2025
Learn more -
Veza Product Updates – January
Learn more -
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation
Learn more
-
Identity Security Posture Management
Learn more -
The MIGHT of Veza
Learn more -
Veza welcomes Mike Towers as Chief Security & Trust Officer
Learn more -
Identity Security Spotlight: Cisco announces “Identity Intelligence”
Learn more -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence
Learn more -
The year of Intelligent Access
Learn more
-
Model Context Protocol (MCP): Implications on identity security and access risks for modern AI-powered apps
Learn more -
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
What is NIST Compliance? Guide & Checklist [2025]
Learn more -
Modern Access Request Processes: Best Practices & What to Avoid in 2025
Learn more -
Simplifying Security: The Power of Effective Access Control in Cybersecurity
Learn more
-
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security
Learn more -
Principle of Least Privilege Explained: Best Practices
Learn more -
Snowflake Roles Best Practices: Steps to Least Privilege
Learn more -
AWS Guide: Access Governance, Security, Compliance & Roles [2024]
Learn more
-
Identity governance in the cloud era
Learn more -
Identity Security Posture Management
Learn more -
Decoding Data Sovereignty with Jenner Holden | Ep 3
Learn more -
Disrupting Breaches and Advancing InfoSec with David Tyburski | Ep 2
Learn more -
Identity Targeting: A Growing Threat with Rachel Wilson | Ep 1
Learn more -
Welcome to the Identity Radicals Podcast
Learn more
-
Reflections from Gartner IAM London: Visibility Leads to Observability
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
Join us at Black Hat USA August 3 – 8, 2024
Learn more -
Join us at RSAC May 6-9, 2024
Learn more -
Veza @ AWS re:Invent
Learn more -
Six takeaways from the Gartner IT Symposium 2023
Learn more
-
Effortless Access Governance for Custom Applications with Veza: Boost Access Reviews with Automation
Learn more -
Model Context Protocol (MCP): Implications on identity security and access risks for modern AI-powered apps
Learn more -
Reflections from Gartner IAM London: Visibility Leads to Observability
Learn more -
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
From Access Oversights to Audit Excellence: How Veza and Legacy IGA Secure SharePoint Environments
Learn more