Explore our posts
-
Charting a Path for the Future of Identity Security
Learn more -
Automated Access Revocation & Remediation at Scale
Learn more -
Veza for HashiCorp Vault: Bringing least privilege to Vault and Secrets
Learn more -
Separation of Duties: Combating Toxic Combinations with SoD Controls
Learn more -
IBM Cost of a Data Breach Report: AI Security Cost Reduction
Learn more -
Identity governance in the cloud era
Learn more
-
Trust as the Foundation for Agentic AI Architecture: Securing Access to all the AI layers – Models, Infra, AI Applications
Learn more -
How Veza Strengthens SOC 1 Compliance: Common Control Failures & How to Fix Them
Learn more -
Model Context Protocol (MCP): Implications on identity security and access risks for modern AI-powered apps
Learn more -
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more
-
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security
Learn more -
Principle of Least Privilege Explained: Best Practices
Learn more -
Snowflake Roles Best Practices: Steps to Least Privilege
Learn more -
AWS Guide: Access Governance, Security, Compliance & Roles [2024]
Learn more
-
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
The Evolution of Identity and Security at Workday: Insights from CISO Josh DeFigueiredo
Learn more -
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation
Learn more -
The Five Tenets of Next-Gen IGA
Learn more -
Posture of Access, 3 Pillars of Least Privilege
Learn more
-
Reflections from Gartner IAM London: Visibility Leads to Observability
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
Join us at Black Hat USA August 3 – 8, 2024
Learn more -
Join us at RSAC May 6-9, 2024
Learn more -
Veza @ AWS re:Invent
Learn more -
Six takeaways from the Gartner IT Symposium 2023
Learn more
-
Join us at RSAC May 6-9, 2024
Learn more -
Identity Security Spotlight: Delinea acquires Fastpath
Learn more -
What is Access Governance? A 2024 overview
Learn more -
User Access Reviews: How They Work & Best Practices
Learn more -
Identity Security Spotlight: Cisco announces “Identity Intelligence”
Learn more