Explore our posts
-
The Next Wave of Implementing Zero Trust: Moving from Authentication to Authorization
Learn more -
Authorization – The New Age of Cloud Identity
Learn more -
Authorization, NOT Authentication: the critical backbone for zero-trust security
Learn more -
Digital Transformation and the Data Authorization Imperative
Learn more
-
Simplifying Security: The Power of Effective Access Control in Cybersecurity
Learn more -
Veza’s Automated Access Revocation and Access Remediation
Learn more -
Securing Snowflake: A CISO’s Guide to Effective Access Control
Learn more -
Acess AI: Introducting the Future of Identity Security | Veza
Learn more -
What is SaaS Sprawl?
Learn more
-
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security
Learn more -
Cybersecurity’s biggest challenge: The Principle of Least Privilege
Learn more -
Role mining for Snowflake: four steps toward least privilege
Learn more -
AWS Guide: Access Governance, Security, Compliance & Roles [2024]
Learn more -
Can you make sense of permissions in AWS?
Learn more
No results found.
-
Disrupting Breaches and Advancing InfoSec with David Tyburski | Ep 2
Learn more -
Why Veza, Why Now?
Learn more -
Identity Targeting: A Growing Threat with Rachel Wilson | Ep 1
Learn more -
Welcome to the Identity Radicals Podcast
Learn more -
Join Us at Oktane: Explore “Bad Permissions” and Veza’s Access Solutions
Learn more -
Veza @ Fal.Con 2023
Learn more