Blog
-
Company
Announcing Veza’s Series D: Securing Identities through Achieving Least Privilege
How do you achieve the principle of least privilege? One access permission at a time. Today, I am thrilled to share a significant milestone in Veza’s journey: we have raised $108 million dollars in Series D funding, led by New Enterprise Associates (NEA) with participation from all our existing investors—including Accel, GV (Google Ventures), True […] -
Identity Security
Veza Access AI – Applications of Gen AI for Identity Security Use Cases
Introduction Veza has consistently pushed the boundaries of innovation in access and identity security. With the introduction of Access AI, Veza has revolutionized how organizations uncover hidden access insights by combining the power of Generative AI with our Access Graph and Access Intelligence products. Access AI enables users to express their intent and desired insights […]
Explore our posts
All Types
All Types
Company
Data Security
History of Hacks
IAM
Identity Radicals
Industry Events
-
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence
Learn more -
Product updates: 2H Release Summary
Learn more -
How to leverage Intelligent Access to de-risk the breach
Learn more -
A field guide to bad permissions part 4: policy-violating permissions
Learn more -
The year of Intelligent Access
Learn more
-
The year of Intelligent Access
Learn more -
Why Veza, Why Now?
Learn more -
Veza @ Fal.Con 2023
Learn more -
Veza Secures Strategic Investment from Capital One Ventures and ServiceNow Ventures to Accelerate Identity Security
Learn more -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence
Learn more -
Welcome, Phil Venables, to the Veza Board of Directors!
Learn more
-
Achieving Least Privilege at Scale: How OPAS Helps Enterprises Reduce Hidden Access Risks
Learn more -
Trust as the Foundation for Agentic AI Architecture: Securing Access to all the AI layers – Models, Infra, AI Applications
Learn more -
How Veza Strengthens SOC 1 Compliance: Common Control Failures & How to Fix Them
Learn more -
Model Context Protocol (MCP): Implications on identity security and access risks for modern AI-powered apps
Learn more -
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It
Learn more
-
Achieving Least Privilege at Scale: How OPAS Helps Enterprises Reduce Hidden Access Risks
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security
Learn more -
Principle of Least Privilege Explained: Best Practices
Learn more -
Snowflake Roles Best Practices: Steps to Least Privilege
Learn more -
AWS Guide: Access Governance, Security, Compliance & Roles [2024]
Learn more
-
When Logging In Is the New Hacking: Nicole Perlroth on the Evolving Cyber Threat Landscape
Learn more -
Simplifying CMMC 2.0 Compliance: Modern Access Control Strategies for Government Contractors
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
The Evolution of Identity and Security at Workday: Insights from CISO Josh DeFigueiredo
Learn more
-
Reflections from Gartner IAM London: Visibility Leads to Observability
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
Join us at Black Hat USA August 3 – 8, 2024
Learn more -
Join us at RSAC May 6-9, 2024
Learn more -
Veza @ AWS re:Invent
Learn more -
Six takeaways from the Gartner IT Symposium 2023
Learn more
-
Veza @ AWS re:Invent
Learn more -
Decoding Data Sovereignty with Jenner Holden | Ep 3
Learn more -
Six takeaways from the Gartner IT Symposium 2023
Learn more -
Three key lessons from unauthorized access to Okta’s support system
Learn more -
Veza @ Gartner Symposium — October 15-19
Learn more -
Disrupting Breaches and Advancing InfoSec with David Tyburski | Ep 2
Learn more