Blog
- 
 Identity Security Identity SecurityUnderstanding ISPM: Closing the Identity Gap with Identity Security Posture ManagementISPM is a new category of identity security designed to help organizations continuously monitor and manage identity risk across cloud, SaaS, and hybrid environments. Learn how Identity Security Posture Management works, why it matters, and how Veza enables it.
- 
 AI AIVeza Access AI – Applications of Gen AI for Identity Security Use CasesVeza Access AI transforms identity security by enabling natural language queries to navigate complex access landscapes, empowering organizations to achieve least privilege effectively.
Explore our posts
- 
 Decoding Identity Security for AI Security Posture Management (AISPM)Learn more
- 
 The Power of Multi-Level User Access ReviewsLearn more
- 
 When Identities Turn Against You: Building an Insider Threat Program for the Cloud EraLearn more
- 
 NHI 2×2 Framework: From Blind Spots to Closed LoopsLearn more
- 
 Veza’s Risk-Based Access Reviews and RecertificationsLearn more
- 
 How Veza Strengthens SOC 1 Compliance: Common Control Failures & How to Fix ThemLearn more
- 
 Model Context Protocol (MCP): Implications on identity security and access risks for modern AI-powered appsLearn more
- 
 GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent ItLearn more
- 
 Achieving DORA Compliance: A Practical Guide for Financial OrganizationsLearn more
- 
 What is NIST Compliance? Guide & Checklist [2025]Learn more
- 
 The Power of Multi-Level User Access ReviewsLearn more
- 
 When Identities Turn Against You: Building an Insider Threat Program for the Cloud EraLearn more
- 
 NHI 2×2 Framework: From Blind Spots to Closed LoopsLearn more
- 
 All the Keys, Visualized: Governing 90+ Non-Human IdentitiesLearn more
- 
 NHI Ownership: Solving the “Who Owns This Bot?” ProblemLearn more
- 
 Identity Security Posture ManagementLearn more
- 
 Decoding Data Sovereignty with Jenner Holden | Ep 3Learn more
- 
 Disrupting Breaches and Advancing InfoSec with David Tyburski | Ep 2Learn more
- 
 Identity Targeting: A Growing Threat with Rachel Wilson | Ep 1Learn more
- 
 Welcome to the Identity Radicals PodcastLearn more
- 
 I Attended the Verizon Data Breach Session at RSA So You Don’t Have To:Learn more
- 
 Reflections from Gartner IAM London: Visibility Leads to ObservabilityLearn more
- 
 Achieving DORA Compliance: A Practical Guide for Financial OrganizationsLearn more
- 
 Join us at Black Hat USA August 3 – 8, 2024Learn more
- 
 Join us at RSAC May 6-9, 2024Learn more
- 
 Veza @ AWS re:InventLearn more




























