Explore our posts
-
Veza Product Updates – July 2024
Learn more -
Identity Security Posture Management
Learn more -
Introducing Access AI: The Future of Identity Security
Learn more -
AI for Identity Security: My Journey, Our Perspective, and Veza’s Strategy
Learn more -
Empowering Business Initiatives with Modern Identity Security
Learn more -
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security
Learn more
-
Simplifying Security: The Power of Effective Access Control in Cybersecurity
Learn more -
Veza’s Automated Access Revocation and Access Remediation
Learn more -
Securing Snowflake: A CISO’s Guide to Effective Access Control
Learn more -
Introducing Access AI: The Future of Identity Security
Learn more -
What is SaaS Sprawl?
Learn more
-
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security
Learn more -
Cybersecurity’s biggest challenge: The Principle of Least Privilege
Learn more -
Role mining for Snowflake: four steps toward least privilege
Learn more -
AWS Guide: Access Governance, Security, Compliance & Roles [2024]
Learn more -
Can you make sense of permissions in AWS?
Learn more
-
Charting a Path for the Future of Identity Security
Learn more -
Identity Radicals: Identity governance in the cloud era
Learn more -
Identity Security Posture Management
Learn more -
Decoding Data Sovereignty with Jenner Holden | Ep 3
Learn more -
Disrupting Breaches and Advancing InfoSec with David Tyburski | Ep 2
Learn more -
Identity Targeting: A Growing Threat with Rachel Wilson | Ep 1
Learn more
No results found.
-
History of Hacks: SSRF attacks on AWS
Learn more -
Into the VezaVerse: SaaS access security & governance
Learn more -
Five ways to stop ransomware attacks
Learn more -
Veza Product Update – April 2023
Learn more -
The Identity Authorization Approach to SaaS Access Governance
Learn more -
How strong is your SaaS Security Posture Management (SSPM)?
Learn more