Explore our posts
-
Demonstrating PCI DSS 4.0 Compliance with Veza’s Identity Security Platform
Learn more -
Complete SailPoint Review & Top Alternatives [2024]
Learn more -
Posture of Access, 3 Pillars of Least Privilege
Learn more -
Access Request Management: A Complete Guide for 2025
Learn more -
Introducing Veza Access Requests: Automated, Policy-Driven Access at Scale
Learn more -
SOX Compliance Checklist: Your Sarbanes-Oxley Guide for 2025
Learn more
-
Identity Security Posture Management
Learn more -
The MIGHT of Veza
Learn more -
Veza welcomes Mike Towers as Chief Security & Trust Officer
Learn more -
Identity Security Spotlight: Cisco announces “Identity Intelligence”
Learn more -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence
Learn more -
The year of Intelligent Access
Learn more
-
Model Context Protocol (MCP): Implications on identity security and access risks for modern AI-powered apps
Learn more -
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
What is NIST Compliance? Guide & Checklist [2025]
Learn more -
Modern Access Request Processes: Best Practices & What to Avoid in 2025
Learn more -
Simplifying Security: The Power of Effective Access Control in Cybersecurity
Learn more
-
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
The Evolution of Identity and Security at Workday: Insights from CISO Josh DeFigueiredo
Learn more -
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation
Learn more -
The Five Tenets of Next-Gen IGA
Learn more -
Posture of Access, 3 Pillars of Least Privilege
Learn more -
Groundhog day in identity security
Learn more
-
Transforming Access Lifecycle Management with Veza’s Access Profiles
Learn more -
Effortless Access Governance for Custom Applications with Veza: Boost Access Reviews with Automation
Learn more -
Model Context Protocol (MCP): Implications on identity security and access risks for modern AI-powered apps
Learn more -
Reflections from Gartner IAM London: Visibility Leads to Observability
Learn more -
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more