Explore our posts
-
The Next Wave of Implementing Zero Trust: Moving from Authentication to Authorization
Learn more -
Authorization – The New Age of Cloud Identity
Learn more -
Authorization, NOT Authentication: the critical backbone for zero-trust security
Learn more -
Digital Transformation and the Data Authorization Imperative
Learn more
-
Simplifying Security: The Power of Effective Access Control in Cybersecurity
Learn more -
Veza’s Automated Access Revocation and Access Remediation
Learn more -
Securing Snowflake: A CISO’s Guide to Effective Access Control
Learn more -
Acess AI: Introducting the Future of Identity Security | Veza
Learn more -
What is SaaS Sprawl?
Learn more
-
Identity Radicals: Groundhog day in identity security
Learn more -
Charting a Path for the Future of Identity Security
Learn more -
Identity Radicals: Identity governance in the cloud era
Learn more -
Identity Security Posture Management
Learn more -
Decoding Data Sovereignty with Jenner Holden | Ep 3
Learn more -
Disrupting Breaches and Advancing InfoSec with David Tyburski | Ep 2
Learn more
No results found.
-
Risk scoring in Identity Security
Learn more -
Charting a Path for the Future of Identity Security
Learn more -
Veza’s Automated Access Revocation and Access Remediation
Learn more -
Veza for HashiCorp Vault: Bringing least privilege to Vault and Secrets
Learn more -
Separation of Duties: Combating Toxic Combinations with SoD Controls | Veza
Learn more -
IBM Cost of a Data Breach Report: AI Security Cost Reduction | Veza
Learn more