Explore our posts
-
Effortless Access Governance for Custom Applications with Veza: Boost Access Reviews with Automation
Learn more -
Model Context Protocol (MCP): Implications on identity security and access risks for modern AI-powered apps
Learn more -
Reflections from Gartner IAM London: Visibility Leads to Observability
Learn more -
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
From Access Oversights to Audit Excellence: How Veza and Legacy IGA Secure SharePoint Environments
Learn more
-
Identity Security Posture Management
Learn more -
The MIGHT of Veza
Learn more -
Veza welcomes Mike Towers as Chief Security & Trust Officer
Learn more -
Identity Security Spotlight: Cisco announces “Identity Intelligence”
Learn more -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence
Learn more -
The year of Intelligent Access
Learn more
-
Snowflake View Permissions: Who Has Access to What?
Learn more -
What is Machine Identity Management? [2024 Guide]
Learn more -
The Imperative for Identity Security: A Call to Action for the Industry
Learn more -
Complete Snowflake Review: Roles, Security & Access Control
Learn more -
Key Takeaways: FBI Breach Prevention Tips
Learn more
-
The Evolution of Identity and Security at Workday: Insights from CISO Josh DeFigueiredo
Learn more -
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation
Learn more -
The Five Tenets of Next-Gen IGA
Learn more -
Posture of Access, 3 Pillars of Least Privilege
Learn more -
Groundhog day in identity security
Learn more -
Charting a Path for the Future of Identity Security
Learn more
-
Reflections from Gartner IAM London: Visibility Leads to Observability
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
Join us at Black Hat USA August 3 – 8, 2024
Learn more -
Join us at RSAC May 6-9, 2024
Learn more -
Veza @ AWS re:Invent
Learn more -
Six takeaways from the Gartner IT Symposium 2023
Learn more
-
Effortless Access Governance for Custom Applications with Veza: Boost Access Reviews with Automation
Learn more -
Model Context Protocol (MCP): Implications on identity security and access risks for modern AI-powered apps
Learn more -
Reflections from Gartner IAM London: Visibility Leads to Observability
Learn more -
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
From Access Oversights to Audit Excellence: How Veza and Legacy IGA Secure SharePoint Environments
Learn more