Blog
- 
 Identity Security Identity SecurityUnderstanding ISPM: Closing the Identity Gap with Identity Security Posture ManagementISPM is a new category of identity security designed to help organizations continuously monitor and manage identity risk across cloud, SaaS, and hybrid environments. Learn how Identity Security Posture Management works, why it matters, and how Veza enables it.
- 
 AI AIVeza Access AI – Applications of Gen AI for Identity Security Use CasesVeza Access AI transforms identity security by enabling natural language queries to navigate complex access landscapes, empowering organizations to achieve least privilege effectively.
Explore our posts
- 
 Veza @ Blackstone: Modernizing IGA with Automation and IntelligenceLearn more
- 
 Product updates: 2H Release SummaryLearn more
- 
 How to leverage Intelligent Access to de-risk the breachLearn more
- 
 A field guide to bad permissions part 4: policy-violating permissionsLearn more
- 
 The year of Intelligent AccessLearn more
- 
 Decoding Identity Security for AI Security Posture Management (AISPM)Learn more
- 
 How To Choose the Right Data Governance Tools [2025]Learn more
- 
 Achieving Least Privilege at Scale: How OPAS Helps Enterprises Reduce Hidden Access RisksLearn more
- 
 Trust as the Foundation for Agentic AI Architecture: Securing Access to all the AI layers – Models, Infra, AI ApplicationsLearn more
- 
 Azure access control and compliance: a practical guide for intelligent accessLearn more
- 
 Enrichment Rules in Veza: Automating Context for Smarter Identity GovernanceLearn more
- 
 How Does Veza Support the Identity Visibility and Intelligence Platform (IVIP) Model?Learn more
- 
 Identity Is the Entry Point: How UNC3944 Breached vSphere Without MalwareLearn more
- 
 Inside Gartner’s 2025 Hype Cycle for Digital Identity: Why IVIP and AI for Access Matter NowLearn more
- 
 Identity Attack Surface Analysis: Securing the New PerimeterLearn more
- 
 The SharePoint Blind Spot: How Legacy IGA Failed to Stop Volt TyphoonLearn more
- 
 Overcoming Identity Silos: Toward Unified Identity SecurityLearn more
- 
 The Security Paradox of Data and Digital TransformationLearn more
- 
 How AI Is Reshaping Identity Security: Opportunities and New ThreatsLearn more
- 
 The Hidden Cost of Over-Provisioned Access: Identity’s Role in Cloud OptimizationLearn more
- 
 Identity is the New Security PerimeterLearn more
- 
 I Attended the Verizon Data Breach Session at RSA So You Don’t Have To:Learn more
- 
 Reflections from Gartner IAM London: Visibility Leads to ObservabilityLearn more
- 
 Achieving DORA Compliance: A Practical Guide for Financial OrganizationsLearn more
- 
 Join us at Black Hat USA August 3 – 8, 2024Learn more
- 
 Join us at RSAC May 6-9, 2024Learn more
- 
 Veza @ AWS re:InventLearn more
- 
 Simplify Access Reviews with Veza’s Intelligent Notification FrameworkLearn more
- 
 Decoding Identity Security for AI Security Posture Management (AISPM)Learn more
- 
 The Power of Multi-Level User Access ReviewsLearn more
- 
 When Identities Turn Against You: Building an Insider Threat Program for the Cloud EraLearn more
- 
 Veza’s Risk-Based Access Reviews and RecertificationsLearn more



























