Explore our posts
-
What is SaaS Sprawl?
Learn more -
Intelligent Access for custom apps: getting started with Veza’s Open Authorization API
Learn more -
Veza Product Updates – May 2024
Learn more -
Cybersecurity’s biggest challenge: The Principle of Least Privilege
Learn more -
Role mining for Snowflake: four steps toward least privilege
Learn more
-
Can you tell who has access to what in Snowflake?
Learn more -
What is Machine Identity Management? [2024 Guide]
Learn more -
The Imperative for Identity Security: A Call to Action for the Industry
Learn more -
Complete Snowflake Review: Roles, Security & Access Control
Learn more -
Key Takeaways: FBI Breach Prevention Tips
Learn more
-
Charting a Path for the Future of Identity Security
Learn more -
Identity Radicals: Identity governance in the cloud era
Learn more -
Identity Security Posture Management
Learn more -
Decoding Data Sovereignty with Jenner Holden | Ep 3
Learn more -
Disrupting Breaches and Advancing InfoSec with David Tyburski | Ep 2
Learn more -
Identity Targeting: A Growing Threat with Rachel Wilson | Ep 1
Learn more
-
Join us at Black Hat USA August 3 – 8, 2024
Learn more -
Join us at RSAC May 6-9, 2024
Learn more -
Veza @ AWS re:Invent
Learn more -
Six takeaways from the Gartner IT Symposium 2023
Learn more -
Veza @ Gartner Symposium — October 15-19
Learn more -
Join Us at Oktane: Explore “Bad Permissions” and Veza’s Access Solutions
Learn more
-
Three key lessons from unauthorized access to Okta’s support system
Learn more -
Why Veza, Why Now?
Learn more -
Veza Secures Strategic Investment from Capital One Ventures and ServiceNow Ventures to Accelerate Identity Security
Learn more -
History of Hacks: Orphaned Accounts
Learn more -
The Age of Identity Security is here: Microsoft goes all-in on identity with Microsoft Entra
Learn more -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence
Learn more
-
Risk scoring in Identity Security
Learn more -
Charting a Path for the Future of Identity Security
Learn more -
Veza’s Automated Access Revocation and Access Remediation
Learn more -
Veza for HashiCorp Vault: Bringing least privilege to Vault and Secrets
Learn more -
Combating Toxic Combinations Through Separation of Duties (SoD) Controls
Learn more -
IBM’s 2024 Cost of a Data Breach Report: AI-Powered Security Lowers Costs
Learn more