Blog
-
Identity SecurityUnderstanding ISPM: Closing the Identity Gap with Identity Security Posture Management
ISPM is a new category of identity security designed to help organizations continuously monitor and manage identity risk across cloud, SaaS, and hybrid environments. Learn how Identity Security Posture Management works, why it matters, and how Veza enables it. -
AIVeza Access AI – Applications of Gen AI for Identity Security Use Cases
Veza Access AI transforms identity security by enabling natural language queries to navigate complex access landscapes, empowering organizations to achieve least privilege effectively.
Explore our posts
-

Announcing Veza’s Series D: Securing Identities through Achieving Least Privilege
Learn more -

Veza Product Updates – March
Learn more -

Veza Product Updates – February
Learn more -

Identity Security Posture Management
Learn more -

The MIGHT of Veza
Learn more -

Veza welcomes Mike Towers as Chief Security & Trust Officer
Learn more
-

Achieving Least Privilege at Scale: How OPAS Helps Enterprises Reduce Hidden Access Risks
Learn more -

Trust as the Foundation for Agentic AI Architecture: Securing Access to all the AI layers – Models, Infra, AI Applications
Learn more -

How Veza Strengthens SOC 1 Compliance: Common Control Failures & How to Fix Them
Learn more -

Model Context Protocol (MCP): Implications on identity security and access risks for modern AI-powered apps
Learn more
-

Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security
Learn more -

Principle of Least Privilege Explained: Best Practices
Learn more -

Snowflake Roles Best Practices: Steps to Least Privilege
Learn more -

AWS Guide: Access Governance, Security, Compliance & Roles [2024]
Learn more
-

Identity Security Posture Management
Learn more -

Decoding Data Sovereignty with Jenner Holden | Ep 3
Learn more -

Disrupting Breaches and Advancing InfoSec with David Tyburski | Ep 2
Learn more -

Identity Targeting: A Growing Threat with Rachel Wilson | Ep 1
Learn more -

Welcome to the Identity Radicals Podcast
Learn more
-
Identiverse 2022 – where are we after a rapid move to cloud data?
Learn more -
The Next Wave of Implementing Zero Trust: Moving from Authentication to Authorization
Learn more -
Authorization, NOT Authentication: the critical backbone for zero-trust security
Learn more -
Data Security: The Challenge of Securing Service Accounts
Learn more


































