Blog
-
Company
Announcing Veza’s Series D: Securing Identities through Achieving Least Privilege
How do you achieve the principle of least privilege? One access permission at a time. Today, I am thrilled to share a significant milestone in Veza’s journey: we have raised $108 million dollars in Series D funding, led by New Enterprise Associates (NEA) with participation from all our existing investors—including Accel, GV (Google Ventures), True […] -
Identity Security
Veza Access AI – Applications of Gen AI for Identity Security Use Cases
Introduction Veza has consistently pushed the boundaries of innovation in access and identity security. With the introduction of Access AI, Veza has revolutionized how organizations uncover hidden access insights by combining the power of Generative AI with our Access Graph and Access Intelligence products. Access AI enables users to express their intent and desired insights […]
Explore our posts
All Types
All Types
Company
Data Security
History of Hacks
IAM
Identity Radicals
Industry Events
-
SailPoint vs Saviynt vs Veza [2025 Review]
Learn more -
Operationalizing Modern Identity Security: A CISO’s Perspective on Value Creation and Sustainable Growth
Learn more -
What is Privileged Access Management? [2025 Guide]
Learn more -
12 Top IGA Software Vendors [2025 Guide]
Learn more -
What is lifecycle management in identity security?
Learn more -
SOC 2 Compliance Requirements [2025]
Learn more
-
Veza Product Updates – February
Learn more -
Identity Security Posture Management
Learn more -
The MIGHT of Veza
Learn more -
Veza welcomes Mike Towers as Chief Security & Trust Officer
Learn more -
Identity Security Spotlight: Cisco announces “Identity Intelligence”
Learn more -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence
Learn more
-
Achieving Least Privilege at Scale: How OPAS Helps Enterprises Reduce Hidden Access Risks
Learn more -
Trust as the Foundation for Agentic AI Architecture: Securing Access to all the AI layers – Models, Infra, AI Applications
Learn more -
How Veza Strengthens SOC 1 Compliance: Common Control Failures & How to Fix Them
Learn more -
Model Context Protocol (MCP): Implications on identity security and access risks for modern AI-powered apps
Learn more -
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It
Learn more
-
Achieving Least Privilege at Scale: How OPAS Helps Enterprises Reduce Hidden Access Risks
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security
Learn more -
Principle of Least Privilege Explained: Best Practices
Learn more -
Snowflake Roles Best Practices: Steps to Least Privilege
Learn more -
AWS Guide: Access Governance, Security, Compliance & Roles [2024]
Learn more
-
When Logging In Is the New Hacking: Nicole Perlroth on the Evolving Cyber Threat Landscape
Learn more -
Simplifying CMMC 2.0 Compliance: Modern Access Control Strategies for Government Contractors
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
The Evolution of Identity and Security at Workday: Insights from CISO Josh DeFigueiredo
Learn more
-
Reflections from Gartner IAM London: Visibility Leads to Observability
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
Join us at Black Hat USA August 3 – 8, 2024
Learn more -
Join us at RSAC May 6-9, 2024
Learn more -
Veza @ AWS re:Invent
Learn more -
Six takeaways from the Gartner IT Symposium 2023
Learn more
-
The Five Tenets of Next-Gen IGA
Learn more -
10 top privileged access management (PAM) software solutions for 2025
Learn more -
Veza Product Updates – December 2024
Learn more -
8 Ways AI is Transforming Access Control in 2025
Learn more -
Demonstrating PCI DSS 4.0 Compliance with Veza’s Identity Security Platform
Learn more -
Complete SailPoint Review & Top Alternatives [2024]
Learn more