Blog
-
Identity Security
Understanding ISPM: Closing the Identity Gap with Identity Security Posture Management
ISPM is a new category of identity security designed to help organizations continuously monitor and manage identity risk across cloud, SaaS, and hybrid environments. Learn how Identity Security Posture Management works, why it matters, and how Veza enables it. -
Identity Security
Veza Access AI – Applications of Gen AI for Identity Security Use Cases
Veza Access AI transforms identity security by enabling natural language queries to navigate complex access landscapes, empowering organizations to achieve least privilege effectively.
Explore our posts
-
Trust as the Foundation for Agentic AI Architecture: Securing Access to all the AI layers – Models, Infra, AI Applications
Learn more -
How Veza Strengthens SOC 1 Compliance: Common Control Failures & How to Fix Them
Learn more -
AI Agents in the Enterprise and Their Implications for Identity Security
Learn more -
Transforming Access Lifecycle Management with Veza’s Access Profiles
Learn more -
Effortless Access Governance for Custom Applications with Veza: Boost Access Reviews with Automation
Learn more
-
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
What is NIST Compliance? Guide & Checklist [2025]
Learn more -
Modern Access Request Processes: Best Practices & What to Avoid in 2025
Learn more -
Simplifying Security: The Power of Effective Access Control in Cybersecurity
Learn more -
Automated Access Revocation & Remediation at Scale
Learn more
-
I Attended the Verizon Data Breach Session at RSA So You Don’t Have To:
Learn more -
Reflections from Gartner IAM London: Visibility Leads to Observability
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
Join us at Black Hat USA August 3 – 8, 2024
Learn more -
Join us at RSAC May 6-9, 2024
Learn more -
Veza @ AWS re:Invent
Learn more
-
Identity Lifecycle Management: Beyond Provisioning & Deprovisioning
Learn more -
Veza Product Updates – September 2024
Learn more -
Simplifying Security: The Power of Effective Access Control in Cybersecurity
Learn more -
Separation of Duties: Combating Toxic Combinations with SoD Controls
Learn more -
Identity governance in the cloud era
Learn more -
Securing Snowflake: A CISO’s Guide to Effective Access Control
Learn more