Veza

Founded in 2020. Privately Held.

External links: homepage | blog | jobs | youtube | twitter | linkedin

Authorization platform for data.

Blog posts published by month since the start of 2019

88 total blog posts published.

Switch to word count

Blog content

post title author published words HN
Authorization: The Missing Piece of Cloud Security Teju Shyamsundar Apr. 06, 2022 1343 -
Defend Against Ransomware with Authorization Monica Armand Nov. 03, 2022 655 -
Ransomware supply chain threats: What made a global automotive company shut their plants this past spring? Teju Shyamsundar Oct. 07, 2022 1056 -
Employee Spotlight: Teju Shyamsundar, Head of Product Marketing Josh Ashton Oct. 10, 2022 1031 -
Cybersecurity Theater: The Show Must (Not) Go On Teju Shyamsundar Oct. 19, 2022 1143 -
Employee Spotlight: Bobby Jackson, Regional Sales Director Josh Ashton Sep. 22, 2022 489 -
BlackHat USA 2022 Recap - 25 years of InfoSec Teju Shyamsundar Sep. 14, 2022 593 -
RBAC vs ABAC: Access Control Explained Kale Bogdanovs Aug. 15, 2022 1698 -
Identity-Security Trends: Expectations vs Reality in Securing Data Teju Shyamsundar Jul. 26, 2022 900 -
Identiverse 2022 - where are we after a rapid move to cloud data? Teju Shyamsundar Jul. 07, 2022 838 -
5 Keys To Securing Your Data in a Multi-Cloud Environment Teju Shyamsundar Jun. 14, 2022 1091 -
The Fundamentals of a Data-Centric Approach to Cloud Security Teju Shyamsundar Jun. 07, 2022 1451 -
The Next Wave of Implementing Zero Trust: Moving from Authentication to Authorization Rich Dandliker May. 31, 2022 1758 -
What is data security? Teju Shyamsundar May. 24, 2022 1221 -
Authorization - The New Age of Cloud Identity Cody Sanford May. 10, 2022 916 -
Authorization, NOT Authentication: the critical backbone for zero-trust security Tarek Khaled May. 10, 2022 1553 -
Digital Transformation and the Data Authorization Imperative Yousuf Khan May. 05, 2022 900 -
Rethinking Data Security with Veza Craig Rosen May. 05, 2022 949 -
Data Security: The Challenge of Securing Service Accounts AK Khan May. 04, 2022 1166 -
Why I’m excited about the future of Veza Niels Provos May. 03, 2022 810 -
Solving the Long-Tail Integration Problem with an Open Platform Strategy: Meet the Open Authorization API (OAA) Rich Dandliker Apr. 26, 2022 1416 -
What Least Privilege Means in Practice Teju Shyamsundar Apr. 25, 2022 1127 -
Why it's Important to Understand Effective Permissions David "Wick" Sedgwick Apr. 25, 2022 1430 -
Security’s Next Frontier - Modernizing Data Security through Authorization for a Cloud-First Future Rich Dandliker Apr. 22, 2022 1090 -
The Basics of AWS IAM - Keeping Cloud Expansion Secure with Identity and Access Management for AWS Kale Bogdanovs Apr. 22, 2022 1696 -
The Veza Voice - December Issue Kale Bogdanovs Dec. 15, 2022 925 -
Security Predictions for 2023 and Beyond Tarun Thakur Jan. 06, 2023 687 -
Integrate custom applications into a single control plane for authorization, with Open Authorization API Jim Lester Jan. 09, 2023 1250 -
The Limits of “Man-in-the-Middle” Architecture for Authorization Rich Dandliker Jan. 25, 2023 615 -
The Veza Voice - January Issue Mike Bartholomy Jan. 30, 2023 699 -
Into the VezaVerse: Veza for Slack Kale Bogdanovs Jan. 31, 2023 135 -
Three tips for collaborating safely in Slack Kale Bogdanovs Feb. 22, 2023 1326 -
Snowflake security: how to manage and secure data access at scale Kale Bogdanovs Feb. 21, 2023 1318 -
Understanding and protecting against the rising threat of Whale Phishing Ellen Falltrick Feb. 27, 2023 1878 -
How to secure access to your source code in GitHub Rich Dandliker Feb. 28, 2023 1299 -
The Veza Voice - February issue Mike Bartholomy Feb. 28, 2023 1215 -
Snowflake security: how to manage entitlement creep Kale Bogdanovs Feb. 28, 2023 1708 -
Find and eliminate direct assignment of apps in your identity platform. Kale Bogdanovs Mar. 10, 2023 117 -
Veza at Gartner IAM Regina Soller-Gould Mar. 20, 2023 256 -
Why I Put My Hoof Down & Joined Veza Gertrude "Gertie" the Goat Mar. 20, 2023 915 -
The hard thing about Zero Trust Jason Garoutte Mar. 20, 2023 590 -
Veza Welcomes Gertie the Goat to Board of Advisors Veza Apr. 01, 2023 512 -
Veza at RSA Regina Soller-Gould Apr. 05, 2023 185 -
The Veza Voice - March Issue Mike Bartholomy Apr. 11, 2023 1024 -
How strong is your SaaS Security Posture Management (SSPM)? Ellen Falltrick Apr. 12, 2023 2389 -
The Identity Authorization Approach to SaaS Access Governance Ellen Falltrick May. 03, 2023 1701 -
Veza Product Update - April 2023 Dr. Maohua Lu May. 12, 2023 735 -
Five ways to stop ransomware attacks Kale Bogdanovs May. 19, 2023 2147 -
Into the VezaVerse: SaaS access security & governance Kale Bogdanovs May. 25, 2023 205 -
The Veza Voice - May Issue Dr. Maohua Lu May. 31, 2023 915 -
The Principle of Least Privilege Explained Kale Bogdanovs May. 25, 2023 3068 -
History of Hacks: SSRF attacks on AWS Ellen Falltrick May. 31, 2023 91 -
History of Hacks: Outmaneuvering MFA Ellen Falltrick Jun. 07, 2023 104 -
Veza @ AWS re:Inforce June 13-14 Regina Soller-Gould Jun. 07, 2023 150 -
Veza @ Snowflake Summit - June 26-29 Regina Soller-Gould Jun. 23, 2023 116 -
Veza Has Passed a New Milestone as it Modernizes Identity Security Jason Garoutte Jun. 22, 2023 1602 -
AWS Verified Permissions release points towards the “Beyond IAM” era Kale Bogdanovs Jun. 23, 2023 985 -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence Tarun Thakur Jul. 21, 2023 637 -
Veza Product Update - June 2023 Dr. Maohua Lu Jul. 26, 2023 890 -
The Age of Identity Security is here: Microsoft goes all-in on identity with Microsoft Entra Brian Schwarz Jul. 28, 2023 643 -
History of Hacks: Orphaned Accounts Ellen Falltrick Jul. 31, 2023 104 -
Welcome, Phil Venables, to the Veza Board of Directors! Tarun Thakur Jul. 19, 2023 984 -
Building Veza’s Platform and Products Tarun Thakur Aug. 15, 2023 894 -
Veza @ Fal.Con 2023 Regina Soller-Gould Sep. 11, 2023 206 -
Join Us at Oktane: Explore "Bad Permissions" and Veza's Access Solutions - Sep. 20, 2023 267 -
Welcome to the Identity Radicals Podcast Veza Sep. 26, 2023 245 -
Identity Targeting: A Growing Threat with Rachel Wilson | Ep 1 Veza Oct. 05, 2023 344 -
The Future of Access Control Tarun Thakur Oct. 10, 2023 1330 -
Veza Secures Strategic Investment from Capital One Ventures and ServiceNow Ventures to Accelerate Identity Security Tarun Thakur Aug. 10, 2023 1042 -
Veza @ Gartner Symposium — October 15-19 Regina Soller-Gould Oct. 25, 2023 264 -
Three key lessons from last week's Okta breach Kale Bogdanovs Oct. 27, 2023 950 -
Disrupting Breaches and Advancing InfoSec with David Tyburski | Ep 2 Veza Oct. 20, 2023 404 -
Three key lessons from unauthorized access to Okta’s support system Kale Bogdanovs Oct. 27, 2023 963 -
Six takeaways from the Gartner IT Symposium 2023 Jason Garoutte Oct. 31, 2023 2066 -
Decoding Data Sovereignty with Jenner Holden | Ep 3 Veza Oct. 20, 2023 437 -
Veza @ AWS re:Invent Regina Soller-Gould Nov. 06, 2023 238 -
Can you make sense of permissions in AWS? Kale Bogdanovs Nov. 17, 2023 1040 -
A field guide to bad permissions, part 1: ungoverned permissions Kale Bogdanovs Nov. 21, 2023 1266 -
The Five Tenets of Next-Gen IGA Jason Garoutte Nov. 20, 2023 2340 -
A field guide to bad permissions part 2: expired permissions Kale Bogdanovs Nov. 30, 2023 1266 -
5 Actionable Strategies to Improve Security Posture Eugene Feldman Dec. 01, 2023 438 -
What is identity security and why is it so complicated? Eugene Feldman Dec. 08, 2023 1174 -
A field guide to bad permissions, part 3: excessive permissions Kale Bogdanovs Dec. 15, 2023 1295 -
A field guide to bad permissions part 4: policy-violating permissions Kale Bogdanovs Dec. 21, 2023 1067 -
The year of Intelligent Access Tarun Thakur Dec. 20, 2023 1451 -
How to leverage Intelligent Access to de-risk the breach Rich Dandliker Jan. 02, 2024 822 -
Product updates: 2H Release Summary Dr. Maohua Lu Jan. 05, 2024 969 -
A Practitioner’s Guide to Intelligent Access Tarun Thakur Dec. 20, 2023 876 -

By Matt Makai. 2021-2024.