Explore our posts
-
IBM Cost of a Data Breach Report: AI Security Cost Reduction | Veza
Learn more -
Identity Radicals: Identity governance in the cloud era
Learn more -
Securing Snowflake: A CISO’s Guide to Effective Access Control
Learn more -
Veza Product Updates – July 2024
Learn more -
Identity Security Posture Management
Learn more -
Acess AI: Introducting the Future of Identity Security | Veza
Learn more
-
The Five Tenets of Next-Gen IGA
Learn more -
Why Veza, Why Now?
Learn more -
Veza @ Fal.Con 2023
Learn more -
Veza Secures Strategic Investment from Capital One Ventures and ServiceNow Ventures to Accelerate Identity Security
Learn more -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence
Learn more -
Welcome, Phil Venables, to the Veza Board of Directors!
Learn more
-
Can you tell who has access to what in Snowflake?
Learn more -
What is Machine Identity Management? [2024 Guide]
Learn more -
The Imperative for Identity Security: A Call to Action for the Industry
Learn more -
Complete Snowflake Review: Roles, Security & Access Control
Learn more -
Key Takeaways: FBI Breach Prevention Tips
Learn more
-
Identity Radicals: Groundhog day in identity security
Learn more -
Charting a Path for the Future of Identity Security
Learn more -
Identity Radicals: Identity governance in the cloud era
Learn more -
Identity Security Posture Management
Learn more -
Decoding Data Sovereignty with Jenner Holden | Ep 3
Learn more -
Disrupting Breaches and Advancing InfoSec with David Tyburski | Ep 2
Learn more
-
12 Top IGA Software Vendors [2025 Guide]
Learn more -
What is lifecycle management in identity security?
Learn more -
SOC 2 Compliance Requirements [2025]
Learn more -
Non-Human Identity Security Risks: Practical Guide to Mitigation | Veza
Learn more -
Going Beyond Provisioning and Deprovisioning with Veza Lifecycle Management
Learn more -
Veza Product Updates – September 2024
Learn more