Explore our posts
-
Operationalizing Modern Identity Security: A CISO’s Perspective on Value Creation and Sustainable Growth
Learn more -
12 Top IGA Software Vendors [2025 Guide]
Learn more -
What is lifecycle management in identity security?
Learn more -
SOC 2 Compliance Requirements [2025]
Learn more -
Non-Human Identity Security Risks: Practical Guide to Mitigation | Veza
Learn more -
Going Beyond Provisioning and Deprovisioning with Veza Lifecycle Management
Learn more
-
Simplifying Security: The Power of Effective Access Control in Cybersecurity
Learn more -
Veza’s Automated Access Revocation and Access Remediation
Learn more -
Securing Snowflake: A CISO’s Guide to Effective Access Control
Learn more -
Acess AI: Introducting the Future of Identity Security | Veza
Learn more -
What is SaaS Sprawl?
Learn more
-
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security
Learn more -
Cybersecurity’s biggest challenge: The Principle of Least Privilege
Learn more -
Role mining for Snowflake: four steps toward least privilege
Learn more -
AWS Guide: Access Governance, Security, Compliance & Roles [2024]
Learn more -
Can you make sense of permissions in AWS?
Learn more
No results found.
-
Defend Against Ransomware with Authorization
Learn more -
Cybersecurity Theater: The Show Must (Not) Go On
Learn more -
Ransomware supply chain threats: What made a global automotive company shut their plants this past spring?
Learn more -
BlackHat USA 2022 Recap – 25 years of InfoSec
Learn more -
RBAC vs ABAC: Access Control Explained
Learn more -
Identity-Security Trends: Expectations vs Reality in Securing Data
Learn more