Blog
-
Company
Announcing Veza’s Series D: Securing Identities through Achieving Least Privilege
How do you achieve the principle of least privilege? One access permission at a time. Today, I am thrilled to share a significant milestone in Veza’s journey: we have raised $108 million dollars in Series D funding, led by New Enterprise Associates (NEA) with participation from all our existing investors—including Accel, GV (Google Ventures), True […] -
Identity Security
Veza Access AI – Applications of Gen AI for Identity Security Use Cases
Veza Access AI transforms identity security by enabling natural language queries to navigate complex access landscapes, empowering organizations to achieve least privilege effectively.
Explore our posts
-
Saviynt Review: Features, Flaws, and Smarter Identity Security Alternatives
Learn more -
Defending Against Volt Typhoon: A CISO’s Playbook with Veza’s Identity Security Platform
Learn more -
From Crisis to Compliance: How Conifer Retail Rebuilt Trust with Identity-First PCI DSS 4.0 Governance
Learn more
-
Achieving Least Privilege at Scale: How OPAS Helps Enterprises Reduce Hidden Access Risks
Learn more -
Trust as the Foundation for Agentic AI Architecture: Securing Access to all the AI layers – Models, Infra, AI Applications
Learn more -
How Veza Strengthens SOC 1 Compliance: Common Control Failures & How to Fix Them
Learn more -
Model Context Protocol (MCP): Implications on identity security and access risks for modern AI-powered apps
Learn more -
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It
Learn more
-
What Are Non-Human Identities?
Learn more -
Identity is Eating Security: Why Access Is the New Perimeter
Learn more -
Achieving Least Privilege at Scale: How OPAS Helps Enterprises Reduce Hidden Access Risks
Learn more -
Achieving DORA Compliance: A Practical Guide for Financial Organizations
Learn more -
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security
Learn more
-
Identiverse 2022 – where are we after a rapid move to cloud data?
Learn more -
The Next Wave of Implementing Zero Trust: Moving from Authentication to Authorization
Learn more -
Authorization, NOT Authentication: the critical backbone for zero-trust security
Learn more -
Data Security: The Challenge of Securing Service Accounts
Learn more