Explore our posts
-
Data Security: The Challenge of Securing Service Accounts
Learn more -
Why I’m excited about the future of Veza
Learn more -
Introducing Veza — Our Quest to Advance the Data Security Industry for Decades to Come
Learn more -
What Least Privilege Means in Practice
Learn more -
Why it’s Important to Understand Effective Permissions
Learn more
-
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security
Learn more -
Cybersecurity’s biggest challenge: The Principle of Least Privilege
Learn more -
Role mining for Snowflake: four steps toward least privilege
Learn more -
AWS Guide: Access Governance, Security, Compliance & Roles [2024]
Learn more -
Can you make sense of permissions in AWS?
Learn more
-
Charting a Path for the Future of Identity Security
Learn more -
Identity Radicals: Identity governance in the cloud era
Learn more -
Identity Security Posture Management
Learn more -
Decoding Data Sovereignty with Jenner Holden | Ep 3
Learn more -
Disrupting Breaches and Advancing InfoSec with David Tyburski | Ep 2
Learn more -
Identity Targeting: A Growing Threat with Rachel Wilson | Ep 1
Learn more
-
IBM’s 2024 Cost of a Data Breach Report: AI-Powered Security Lowers Costs
Learn more -
Mitigating the UNC3944 Threat: The Power of Modern Identity Security Platforms
Learn more -
Identity Security Spotlight: Ransomware attack on Ascension
Learn more -
Identity Security Spotlight: Microsoft CISA Investigation
Learn more -
Veza welcomes Mike Towers as Chief Security & Trust Officer
Learn more -
Identity Security Spotlight: Delinea acquires Fastpath
Learn more
No results found.
-
How strong is your SaaS Security Posture Management (SSPM)?
Learn more -
The Veza Voice – March Issue
Learn more -
Veza at RSA
Learn more -
Veza Welcomes Gertie the Goat to Board of Advisors
Learn more -
The hard thing about Zero Trust
Learn more -
Beyond IAM: Zero Trust Needs A Second Act in Identity
Learn more