Explore our posts
-
Veza @ Snowflake Summit – June 26-29
Learn more -
AWS Verified Permissions release points towards the “Beyond IAM” era
Learn more -
History of Hacks: Outmaneuvering MFA
Learn more -
Veza @ AWS re:Inforce June 13-14
Learn more -
The Veza Voice – May Issue
Learn more -
History of Hacks: SSRF attacks on AWS
Learn more
-
Model Context Protocol (MCP): Implications on identity security and access risks for modern AI-powered apps
Learn more -
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
What is NIST Compliance? Guide & Checklist [2025]
Learn more -
Modern Access Request Processes: Best Practices & What to Avoid in 2025
Learn more
-
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security
Learn more -
Principle of Least Privilege Explained: Best Practices
Learn more -
Snowflake Roles Best Practices: Steps to Least Privilege
Learn more -
AWS Guide: Access Governance, Security, Compliance & Roles [2024]
Learn more
-
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
The Evolution of Identity and Security at Workday: Insights from CISO Josh DeFigueiredo
Learn more -
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation
Learn more -
The Five Tenets of Next-Gen IGA
Learn more -
Posture of Access, 3 Pillars of Least Privilege
Learn more
-
Reflections from Gartner IAM London: Visibility Leads to Observability
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
Join us at Black Hat USA August 3 – 8, 2024
Learn more -
Join us at RSAC May 6-9, 2024
Learn more -
Veza @ AWS re:Invent
Learn more -
Six takeaways from the Gartner IT Symposium 2023
Learn more
-
Introducing Veza — Our Quest to Advance the Data Security Industry for Decades to Come
Learn more -
What Least Privilege Means in Practice
Learn more -
Why it’s Important to Understand Effective Permissions
Learn more -
Security’s Next Frontier – Modernizing Data Security through Authorization for a Cloud-First Future
Learn more