Explore our posts
-
Veza Welcomes Gertie the Goat to Board of Advisors
Learn more -
The hard thing about Zero Trust
Learn more -
Beyond IAM: Zero Trust Needs A Second Act in Identity
Learn more -
Veza at Gartner IAM
Learn more -
Why I Put My Hoof Down & Joined Veza
Learn more -
Find and eliminate direct assignment of apps in your identity platform.
Learn more
-
Identity Security Posture Management
Learn more -
The MIGHT of Veza
Learn more -
Veza welcomes Mike Towers as Chief Security & Trust Officer
Learn more -
Identity Security Spotlight: Cisco announces “Identity Intelligence”
Learn more -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence
Learn more -
The year of Intelligent Access
Learn more
-
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security
Learn more -
Cybersecurity’s biggest challenge: The Principle of Least Privilege
Learn more -
Role mining for Snowflake: four steps toward least privilege
Learn more -
AWS Guide: Access Governance, Security, Compliance & Roles [2024]
Learn more -
Can you make sense of permissions in AWS?
Learn more
-
Join us at Black Hat USA August 3 – 8, 2024
Learn more -
Join us at RSAC May 6-9, 2024
Learn more -
Veza @ AWS re:Invent
Learn more -
Six takeaways from the Gartner IT Symposium 2023
Learn more -
Veza @ Gartner Symposium — October 15-19
Learn more -
Join Us at Oktane: Explore “Bad Permissions” and Veza’s Access Solutions
Learn more
-
IBM Cost of a Data Breach Report: AI Security Cost Reduction | Veza
Learn more -
Mitigating the UNC3944 Threat: The Power of Modern Identity Security Platforms
Learn more -
Identity Security Spotlight: Ransomware attack on Ascension
Learn more -
Identity Security Spotlight: Microsoft CISA Investigation
Learn more -
Veza welcomes Mike Towers as Chief Security & Trust Officer
Learn more -
Identity Security Spotlight: Delinea acquires Fastpath
Learn more
-
Identity Radicals: Groundhog day in identity security
Learn more -
Operationalizing Modern Identity Security: A CISO’s Perspective on Value Creation and Sustainable Growth
Learn more -
What is lifecycle management in identity security?
Learn more -
SOC 2 Compliance Requirements [2025]
Learn more -
Non-Human Identity Security Risks: Practical Guide to Mitigation | Veza
Learn more -
Going Beyond Provisioning and Deprovisioning with Veza Lifecycle Management
Learn more