|
Identity Security Spotlight: Delinea acquires Fastpath
|
Veza |
2024-02-26 |
337 |
--
|
|
Identity Security Spotlight: Cisco announces “Identity Intelligence”
|
Veza |
2024-02-08 |
41 |
--
|
|
Lessons from the breach: Microsoft and Midnight Blizzard
|
Veza |
2024-02-21 |
341 |
--
|
|
Identity Security Spotlight: Midnight Blizzard’s breach of Microsoft
|
Veza |
2024-02-07 |
340 |
--
|
|
What is Access Governance? A 2024 overview
|
Jared Blistein |
2024-02-23 |
2,220 |
--
|
|
How to leverage Intelligent Access to de-risk the breach
|
Rich Dandliker |
2024-01-02 |
776 |
--
|
|
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence
|
Tarun Thakur |
2024-01-31 |
644 |
--
|
|
User Access Reviews: How They Work & Best Practices
|
Alisa Ho |
2024-02-16 |
2,516 |
--
|
|
Product updates: 2H Release Summary
|
Dr. Maohua Lu |
2024-01-05 |
1,001 |
--
|
|
Join us at RSAC May 6-9, 2024
|
Veza |
2024-03-13 |
154 |
--
|
|
GitHub Access Control, Access Management, Security, Roles, Authorization & More
|
Veza |
2024-03-15 |
1,811 |
--
|
|
Veza welcomes Mike Towers as Chief Security & Trust Officer
|
Veza |
2024-03-15 |
70 |
--
|
|
Veza for Zscaler: Bringing least privilege to ZIA
|
Veza |
2024-03-22 |
342 |
--
|
|
Invisible keyholders: the importance of Non-Human Identity Management
|
Mike Towers |
2024-03-22 |
780 |
--
|
|
What is Identity Security?
|
Veza |
2024-03-29 |
2,303 |
--
|
|
Key Takeaways: FBI Breach Prevention Tips
|
Veza |
2024-04-10 |
918 |
--
|
|
Veza for HashiCorp Vault: Bringing least privilege to Vault and Secrets
|
Tarun Thakur |
2024-04-12 |
386 |
--
|
|
Veza for Crowdstrike: Identify, triage and remediate in minutes
|
Tarun Thakur |
2024-04-12 |
217 |
--
|
|
Complete Snowflake Review: Roles, Security & Access Control
|
Veza |
2024-04-12 |
1,971 |
--
|
|
Veza Product Updates – February 2024
|
Dr. Maohua Lu |
2024-04-15 |
689 |
--
|
|
Identity Security Posture Management
|
Tarun Thakur |
2024-04-18 |
598 |
--
|
|
What is non-human identity management
|
Veza |
2024-04-19 |
2,272 |
--
|
|
Veza Product Updates – March 2024
|
Dr. Maohua Lu |
2024-04-19 |
903 |
--
|
|
The Imperative for Identity Security: A Call to Action for the Industry
|
Mike Towers |
2024-04-24 |
1,043 |
--
|
|
Identity Security Spotlight: Ransomware attack on Ascension
|
Veza |
2024-05-17 |
59 |
--
|
|
The Veza Voice – Q1 2025
|
Mike Torres |
2024-05-17 |
2,009 |
--
|
|
What is IGA (Identity Governance & Administration)?
|
Veza |
2024-05-23 |
2,286 |
--
|
|
Announcing The State of Access 2024
|
Tarun Thakur |
2024-05-22 |
421 |
--
|
|
Harnessing the Power of AI: Identity Security as a Key Enabler
|
Mike Towers |
2024-05-23 |
867 |
--
|
|
AWS Guide: Access Governance, Security, Compliance & Roles [2024]
|
Veza |
2024-06-05 |
2,990 |
--
|
|
Achieving, Demonstrating, and Maintaining PCI DSS Compliance with Veza: A Game-Changer for …
|
Mike Towers |
2024-06-06 |
751 |
--
|
|
What is Machine Identity Management? [2024 Guide]
|
Veza |
2024-06-07 |
2,838 |
--
|
|
Can you tell who has access to what in Snowflake?
|
Kale Bogdanovs |
2024-06-18 |
2,050 |
--
|
|
Veza Product Updates – April 2024
|
Dr. Maohua Lu |
2024-06-20 |
1,708 |
--
|
|
The Critical Role of Identity Security in Enabling Zero Trust
|
Mike Towers |
2024-07-01 |
559 |
--
|
|
Authentication vs Authorization
|
Veza |
2024-07-02 |
2,088 |
--
|
|
Role mining for Snowflake: four steps toward least privilege
|
Santosh Kumar |
2024-07-02 |
1,706 |
--
|
|
Veza Product Updates – May 2024
|
Dr. Maohua Lu |
2024-07-08 |
1,422 |
--
|
|
Intelligent Access for custom apps: getting started with Veza’s Open Authorization API
|
Zee Khoo |
2024-07-11 |
2,160 |
--
|
|
What is SaaS Sprawl?
|
Veza |
2024-07-11 |
2,189 |
--
|
|
Mitigating the UNC3944 Threat: The Power of Modern Identity Security Platforms
|
Mike Towers |
2024-07-18 |
491 |
--
|
|
Join us at Black Hat USA August 3 – 8, 2024
|
Veza |
2024-07-17 |
177 |
--
|
|
The MIGHT of Veza
|
Amy Veater |
2024-07-22 |
593 |
--
|
|
Veza Product Updates – June 2024
|
Dr. Maohua Lu |
2024-07-24 |
1,281 |
--
|
|
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to …
|
Rich Dandliker |
2024-07-30 |
965 |
--
|
|
Empowering Business Initiatives with Modern Identity Security
|
Mike Towers |
2024-08-02 |
1,244 |
--
|
|
AI for Identity Security: My Journey, Our Perspective, and Veza’s Strategy
|
Rich Dandliker |
2024-08-06 |
1,278 |
--
|
|
Introducing Access AI: The Future of Identity Security
|
Jared Blistein |
2024-08-06 |
631 |
--
|
|
Veza Product Updates – July 2024
|
Dr. Maohua Lu |
2024-08-19 |
1,477 |
--
|
|
Securing Snowflake: A CISO’s Guide to Effective Access Control
|
Mike Towers |
2024-08-22 |
1,283 |
--
|
|
Identity Radicals: Identity governance in the cloud era
|
Veza |
2024-08-26 |
1,167 |
--
|
|
IBM’s 2024 Cost of a Data Breach Report: AI-Powered Security Lowers Costs
|
Jared Blistein |
2024-08-28 |
1,652 |
--
|
|
Combating Toxic Combinations Through Separation of Duties (SoD) Controls
|
Jared Blistein |
2024-08-29 |
1,365 |
--
|
|
Veza’s Automated Access Revocation and Access Remediation
|
Tom Smith |
2024-09-10 |
1,000 |
--
|
|
Veza Product Updates – August 2024
|
Dr. Maohua Lu |
2024-09-12 |
1,153 |
--
|
|
Charting a Path for the Future of Identity Security
|
Mike Towers |
2024-09-23 |
1,331 |
--
|
|
Identity Security Spotlight: Microsoft CISA Investigation
|
Veza |
2024-04-16 |
87 |
--
|
|
Risk scoring in Identity Security
|
Santosh Kumar |
2024-10-10 |
1,517 |
--
|
|
Simplifying Security: The Power of Effective Access Control in Cybersecurity
|
Mike Towers |
2024-10-18 |
1,005 |
--
|
|
Veza Product Updates – September 2024
|
Dr. Maohua Lu |
2024-10-21 |
1,800 |
--
|
|
Going Beyond Provisioning and Deprovisioning with Veza Lifecycle Management
|
Sandler Rubin |
2024-10-22 |
1,465 |
--
|
|
Non-Human Identity Security: A Practical Guide to Mitigating Risk
|
Jared Blistein |
2024-10-29 |
1,776 |
--
|
|
Operationalizing Modern Identity Security: A CISO’s Perspective on Value Creation and Sustainable …
|
Mike Towers |
2024-11-11 |
1,187 |
--
|
|
SOC 2 Compliance Requirements [2025]
|
Veza |
2024-11-08 |
3,593 |
--
|
|
Identity Radicals: Groundhog day in identity security
|
Veza |
2024-11-21 |
687 |
--
|
|
What is lifecycle management in identity security?
|
Veza |
2024-11-08 |
1,925 |
--
|
|
IBM Cost of a Data Breach Report: AI Security Cost Reduction | …
|
Jared Blistein |
2024-08-28 |
1,652 |
--
|
|
Veza Product Updates – October 2024
|
Dr. Maohua Lu |
2024-11-22 |
1,547 |
--
|
|
Acess AI: Introducting the Future of Identity Security | Veza
|
Jared Blistein |
2024-08-06 |
631 |
--
|
|
Separation of Duties: Combating Toxic Combinations with SoD Controls | Veza
|
Jared Blistein |
2024-08-29 |
1,365 |
--
|
|
12 Top IGA Software Vendors [2025 Guide]
|
Veza |
2024-11-08 |
3,712 |
--
|
|
SOX Compliance Checklist: Your Sarbanes-Oxley Guide for 2025
|
Veza |
2024-12-02 |
3,188 |
--
|
|
Introducing Veza Access Requests: Automated, Policy-Driven Access at Scale
|
Jared Blistein |
2024-12-03 |
954 |
--
|
|
Posture of Access, 3 Pillars of Least Privilege | Ep 6, Identity …
|
Veza |
2024-12-10 |
162 |
--
|
|
Demonstrating PCI DSS 4.0 Compliance with Veza’s Identity Security Platform
|
Mike Towers |
2024-12-12 |
1,892 |
--
|
|
Guide to Non-Human Identity Security
|
Veza |
2025-01-15 |
2,445 |
--
|
|
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation
|
Veza |
2025-01-16 |
167 |
--
|
|
Veza Access AI – Applications of Gen AI for Identity Security Use …
|
Shanmukh Sista |
2025-01-21 |
2,573 |
--
|
|
Modern Access Request Processes: Best Practices & What to Avoid in 2025
|
Veza |
2025-02-03 |
3,737 |
--
|
|
Access Request Management: A Complete Guide for 2025
|
Veza |
2024-12-06 |
2,387 |
--
|
|
Posture of Access, 3 Pillars of Least Privilege
|
Veza |
2024-12-10 |
167 |
--
|
|
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation
|
Veza |
2025-01-16 |
167 |
--
|
|
What is NIST Compliance? Guide & Checklist [2025]
|
Veza |
2025-02-13 |
2,703 |
--
|
|
Access AI: Introducing the Future of Identity Security
|
Jared Blistein |
2024-08-06 |
643 |
--
|
|
8 Ways AI is Transforming Access Control in 2025
|
Veza |
2024-12-20 |
2,702 |
--
|
|
What is Privileged Access Management? [2025 Guide]
|
Jared Blistein |
2024-11-09 |
4,192 |
--
|
|
Veza Product Updates – November 2024
|
Veza |
2025-02-24 |
1,710 |
--
|
|
SailPoint vs Saviynt vs Veza [2025 Review]
|
Veza |
2024-11-15 |
2,740 |
--
|
|
The Evolution of Identity and Security at Workday: Insights from CISO Josh …
|
Veza |
2025-02-27 |
585 |
--
|
|
10 top privileged access management (PAM) software solutions for 2025
|
Jared Blistein |
2025-01-02 |
3,894 |
--
|
|
Complete SailPoint Review & Top Alternatives [2024]
|
Ellen Falltrick |
2024-12-11 |
2,471 |
--
|
|
How Veza Simplies SOX Compliance: Automating Access Controls & SoD Monitoring
|
Amber Li |
2025-03-07 |
1,366 |
--
|
|
From Access Oversights to Audit Excellence: How Veza and Legacy IGA Secure …
|
Matthew Romero |
2025-03-11 |
1,177 |
--
|
|
Veza Product Updates – January
|
Veza |
2025-01-31 |
2,520 |
--
|
|
Veza Product Updates – December 2024
|
Veza |
2024-12-30 |
1,397 |
--
|
|
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent …
|
Taylor Parsons |
2025-03-25 |
979 |
--
|
|
From Access Oversights to Audit Excellence: How Veza and Legacy IGA Secure …
|
Matthew Romero |
2025-03-11 |
1,177 |
--
|
|
Achieving DORA Compliance: A Practical Guide for Financial Organizations
|
Mike Towers |
2025-03-24 |
1,254 |
--
|
|
Reflections from Gartner IAM London: Visibility Leads to Observability
|
Rob Rachwald |
2025-03-25 |
424 |
--
|
|
Model Context Protocol (MCP): Implications on identity security and access risks for …
|
Shanmukh Sista |
2025-03-31 |
1,690 |
--
|
|
Effortless Access Governance for Custom Apps with Veza: Boost Access Reviews with …
|
Swetha Lakshmanan |
2025-04-01 |
982 |
--
|
|
The Treasury Access Incident: Five Critical Lessons for Modern Identity Security
|
Mike Towers |
2025-04-04 |
1,101 |
--
|
|
Transforming Access Lifecycle Management with Veza’s Access Profiles
|
Sandler Rubin |
2025-04-03 |
1,054 |
--
|
|
AI Agents in the Enterprise and Their Implications for Identity Security
|
Rich Dandliker |
2025-04-08 |
2,296 |
--
|
|
How Veza Strengthens SOC 1 Compliance: Common Control Failures & How to …
|
Amber Li |
2025-04-10 |
2,160 |
--
|
|
Trust as the Foundation for Agentic AI Architecture: Securing Access to all …
|
Dr. Maohua Lu |
2025-04-14 |
842 |
--
|
|
Veza Product Updates – February
|
Veza |
2025-02-13 |
2,243 |
--
|
|
Simplifying CMMC 2.0 Compliance: Modern Access Control Strategies for Government Contractors
|
Mike Towers |
2025-04-18 |
1,426 |
--
|
|
When Logging In Is the New Hacking: Nicole Perlroth on the Evolving …
|
Veza |
2025-04-21 |
496 |
--
|
|
The Third-Party Access Problem: The Elephant in the Room for Every CISO’s …
|
Mike Towers |
2025-04-25 |
1,375 |
--
|
|
Least privilege demands that identity goes beyond IAM teams to app, data …
|
Tarun Thakur |
2025-04-22 |
1,167 |
--
|
|
Achieving Least Privilege at Scale: How OPAS Helps Enterprises Reduce Hidden Access …
|
Santosh Kumar |
2025-04-23 |
1,764 |
--
|
|
Announcing Veza’s Series D: Securing Identities through Achieving Least Privilege
|
Tarun Thakur |
2025-04-28 |
681 |
--
|
|
Identity is Eating Security: Why Access Is the New Perimeter
|
Mike Towers |
2025-04-30 |
1,024 |
--
|
|
The State of SaaS Security: Why Identity is the Critical Control Point
|
Mike Towers |
2025-05-06 |
824 |
--
|
|
Just-in-Time (JIT) Access with Veza Access Requests
|
Sandler Rubin |
2025-05-05 |
3,441 |
--
|
|
Veza Product Updates – March
|
Veza |
2025-03-26 |
2,235 |
--
|
|
Defending Against Volt Typhoon: A CISO’s Playbook with Veza’s Identity Security Platform
|
Rob Rachwald |
2025-05-23 |
904 |
--
|
|
What Are Non-Human Identities?
|
Matthew Romero |
2025-05-13 |
3,087 |
--
|
|
Machine Identities: Definition, How They Work, and Security Best Practices
|
Matthew Romero |
2025-05-20 |
3,277 |
--
|
|
How Veza Leverages Role Mining to Address the Evolving Needs of Identity …
|
Matthew Romero |
2025-05-14 |
1,300 |
--
|
|
“Set It and Forget It” Access Control Is No Longer Enough
|
Mike Towers |
2025-05-16 |
966 |
--
|
|
From Crisis to Compliance: How Conifer Retail Rebuilt Trust with Identity-First PCI …
|
Matthew Romero |
2025-05-15 |
1,154 |
--
|
|
Why Identity Is the Cornerstone of Zero Trust Architecture
|
Tim Chase |
2025-06-03 |
1,716 |
--
|
|
Veza Product Updates – April
|
Veza |
2025-04-29 |
3,044 |
--
|
|
What is identity and access management [2025 guide]
|
Matthew Romero |
2025-05-27 |
3,556 |
--
|
|
I Attended the Verizon Data Breach Session at RSA So You Don’t …
|
Rob Rachwald |
2025-05-30 |
884 |
--
|
|
Saviynt Review: Features, Flaws, and Smarter Identity Security Alternatives
|
Quoc Hoang |
2025-05-29 |
2,755 |
--
|
|
Operationalizing the Identity Security Platform with Veza Actions
|
Matthew Romero |
2025-06-05 |
1,069 |
--
|
|
Identity Crisis: The Rise of Machines
|
Veza |
2025-06-03 |
321 |
--
|
|
Operationalizing Identity Risk Insights with Veza + Microsoft Defender for Identity
|
Matthew Romero |
2025-06-10 |
1,625 |
--
|
|
Veza Access Intelligence: Role Engineering for Modern Access Control
|
Matthew Romero |
2025-06-13 |
1,382 |
--
|
|
Mind the Gap: Access Governance for Disconnected Apps
|
Matthew Romero |
2025-06-17 |
1,156 |
--
|
|
How AI Is Reshaping Identity Security: Opportunities and New Threats
|
Mike Towers |
2025-08-08 |
1,609 |
--
|
|
Veza Product Updates – August 2025
|
Veza |
2025-10-15 |
2,833 |
--
|
|
The Trust Dividend: How Security Leaders Build Enterprise Value
|
Mike Towers |
2025-07-25 |
1,853 |
--
|
|
All the Keys, Visualized: Governing 90+ Non-Human Identities
|
Matthew Romero |
2025-10-16 |
1,219 |
--
|
|
DOJ’s Bulk Data Transfer Rule: Why Identity Visibility is Now a Compliance …
|
Rob Rachwald |
2025-08-28 |
1,040 |
--
|
|
When Identities Turn Against You: Building an Insider Threat Program for the …
|
Nathan Casey |
2025-10-24 |
1,257 |
--
|
|
Inside Gartner’s 2025 Hype Cycle for Digital Identity: Why IVIP and AI …
|
Matthew Romero |
2025-07-29 |
1,066 |
--
|
|
11 Best Zero Trust Providers for 2026
|
Matthew Romero |
2025-12-30 |
2,555 |
--
|
|
NHI 2×2 Framework: From Blind Spots to Closed Loops
|
Matthew Romero |
2025-10-21 |
1,406 |
--
|
|
ServiceNow + Veza: A new chapter in identity security
|
Veza |
2025-12-02 |
1,112 |
--
|
|
The Security Paradox of Data and Digital Transformation
|
Mike Towers |
2025-08-15 |
1,344 |
--
|
|
The SharePoint Blind Spot: How Legacy IGA Failed to Stop Volt Typhoon
|
Mike Towers |
2025-08-29 |
1,171 |
--
|
|
Why Analysts Keep Pointing To Veza as the Leader In The New …
|
Matthew Romero |
2025-12-16 |
2,713 |
--
|
|
Identity Visibility and Intelligence Platforms (IVIP): The Missing Layer in the IAM …
|
Rob Rachwald |
2025-07-08 |
1,244 |
--
|
|
What is Cloud Identity Security? Key Considerations
|
Rob Rachwald |
2025-08-07 |
2,581 |
--
|
|
Identity Is the Entry Point: How UNC3944 Breached vSphere Without Malware
|
Rob Rachwald |
2025-07-30 |
1,921 |
--
|
|
How To Choose the Right Data Governance Tools [2025]
|
Matthew Romero |
2025-09-18 |
1,445 |
--
|
|
Ransomware Isn’t Just Malware Anymore – It’s an Identity Problem
|
Matthew Romero |
2025-09-11 |
857 |
--
|
|
Enrichment Rules in Veza: Automating Context for Smarter Identity Governance
|
Matthew Romero |
2025-08-12 |
1,093 |
--
|
|
Veza Access AI Powered Universal Search for all Identity Security Use Cases
|
Shanmukh Sista |
2025-08-13 |
546 |
--
|
|
On-demand Access Reviews
|
Bradley Creado |
2025-11-07 |
2,060 |
--
|
|
12 Best Identity Security Software [2025]
|
Quoc Hoang |
2025-06-20 |
3,272 |
--
|
|
Veza Product Updates – May
|
Veza |
2025-05-29 |
2,860 |
--
|
|
Better Together: Augmenting SailPoint with Full-Stack Access Visibility
|
Matthew Romero |
2025-06-27 |
1,352 |
--
|
|
Forrester Recognizes Veza for IGA, ISPM, and NHI/AI Identity Management
|
Veza |
2026-01-15 |
962 |
--
|
|
Overcoming Identity Silos: Toward Unified Identity Security
|
Mike Towers |
2025-08-22 |
1,835 |
--
|
|
7 user access review software tools to know in 2025
|
Quoc Hoang |
2025-07-24 |
2,494 |
--
|
|
Veza’s Risk-Based Access Reviews and Recertifications
|
Bradley Creado |
2025-10-17 |
848 |
--
|
|
From Visibility to Automation: Achieving True Least Privilege Access with Veza’s Access …
|
Varun Ramesh Athreya |
2025-10-29 |
1,756 |
--
|
|
Veza Access AI to manage Access Risks of AI Agents
|
Kumar Saurabh Arora |
2025-07-29 |
788 |
--
|
|
AI Agents Are Becoming Your New Privileged Workforce
|
Dr. Maohua Lu |
2025-12-09 |
1,192 |
--
|
|
Azure access control and compliance: a practical guide for intelligent access
|
Matthew Romero |
2025-09-25 |
2,175 |
--
|
|
Veza Product Updates – September 2025
|
Sameer Mehta |
2025-11-04 |
2,966 |
--
|
|
What Is an Identity Visibility and Intelligence Platform (IVIP)?
|
Matthew Romero |
2025-07-17 |
1,667 |
--
|
|
What is Light IGA? Is it the right security solution for you?
|
Matthew Romero |
2025-10-02 |
1,069 |
--
|
|
Decoding the OCC’s Spring 2025 Risk Report: Why Identity Security Must Be …
|
Zachary Wilson |
2025-08-07 |
1,504 |
--
|
|
Risk 2.0: Evolving How We Visualize and Act on Identity Risk
|
Atul Pol |
2026-01-07 |
1,624 |
--
|
|
Privilege Creep: What It Is and How To Prevent It
|
Matthew Romero |
2025-08-14 |
1,343 |
--
|
|
Veza Product Updates – October 2025
|
Sameer Mehta |
2025-12-09 |
2,058 |
--
|
|
2025: The Year of Product Innovation
|
Sameer Mehta |
2026-01-11 |
1,568 |
--
|
|
Defining Access: Roles and Controls in Veza Access Reviews
|
Bradley Creado |
2025-11-17 |
2,183 |
--
|
|
Veza Product Updates – July 2025
|
Veza |
2025-10-07 |
2,457 |
--
|
|
The Power of Multi-Level User Access Reviews
|
Biju Vadakumchery |
2025-10-24 |
1,584 |
--
|
|
Closing the Gap Between Threat Detection and Identity Risk
|
Matthew Romero |
2025-08-21 |
823 |
--
|
|
Veza for Security Operations: Make Identity Operational
|
Matthew Romero |
2025-09-29 |
868 |
--
|
|
Identity is the New Security Perimeter
|
Ellen James |
2025-07-28 |
629 |
--
|
|
Veza Product Updates – June 2025
|
Veza |
2025-09-18 |
3,276 |
--
|
|
Unlocking App Onboarding at Scale: The Power of Veza’s 300+ Integrations and …
|
Matthew Romero |
2025-07-31 |
1,096 |
--
|
|
17 Best data governance tools [2025 review]
|
Quoc Hoang |
2025-06-23 |
3,063 |
--
|
|
NHI Ownership: Solving the “Who Owns This Bot?” Problem
|
Matthew Romero |
2025-10-14 |
2,326 |
--
|
|
Understanding ISPM: Closing the Identity Gap with Identity Security Posture Management
|
Matthew Romero |
2025-07-16 |
1,937 |
--
|
|
Introducing Access AI powered Access Risk Analysis
|
Shanmukh Sista |
2025-09-16 |
629 |
--
|
|
The Hidden Cost of Over-Provisioned Access: Identity’s Role in Cloud Optimization
|
Mike Towers |
2025-08-01 |
1,485 |
--
|
|
Simplify Access Reviews with Veza’s Intelligent Notification Framework
|
Biju Vadakumchery |
2025-10-31 |
1,985 |
--
|
|
They’re Not Hacking In, They’re Logging In: Ensure Your Insurability in the …
|
Naren Vaideeswaran |
2025-10-08 |
898 |
--
|
|
The NHI Iceberg: Veza NHI Security brings visibility and actionability of the …
|
Kumar Saurabh Arora |
2025-08-14 |
665 |
--
|
|
Looking ahead to 2026
|
Tarun Thakur |
2026-01-06 |
722 |
--
|
|
Identity Is the New Control Plane
|
Matthew Romero |
2025-12-23 |
1,011 |
--
|
|
Stopping Insider Risk in Its Tracks with Veza + CrowdStrike Falcon
|
Matthew Romero |
2025-06-19 |
905 |
--
|
|
Is Your IGA Solution Stuck in the Past? Time for an Upgrade
|
Sandler Rubin |
2025-06-24 |
1,968 |
--
|
|
Access Control Compliance Guide for IT Professionals [2025 Review]
|
Matthew Romero |
2025-07-22 |
4,734 |
--
|
|
How Does Veza Support the Identity Visibility and Intelligence Platform (IVIP) Model?
|
Matthew Romero |
2025-08-05 |
978 |
--
|
|
Veza for Oracle Applications: Solving the Access Management Puzzle
|
Jim Lester |
2025-07-15 |
1,368 |
--
|
|
How to Govern OpenAI Access While Enforcing Least Privilege: Three Enterprise Perspectives
|
Matthew Romero |
2025-09-05 |
779 |
--
|
|
How AI is impacting identity security and privileged access management in 2025
|
Matthew Romero |
2025-08-06 |
2,118 |
--
|
|
Identity Attack Surface Analysis: Securing the New Perimeter
|
Nathan Casey |
2025-07-10 |
2,308 |
--
|
|
From Exposed to Reinvention-Ready: Why Identity Security Is the Foundation of AI …
|
Mike Towers |
2025-07-03 |
1,202 |
--
|
|
Decoding Identity Security for AI Security Posture Management (AISPM)
|
Dr. Maohua Lu |
2025-10-29 |
993 |
--
|
|
Introducing VQL – Veza Query Language
|
Amber Li |
2025-08-26 |
1,373 |
--
|
|
How Revocation, Remediation, and Reconciliation Work in Veza Access Reviews
|
Biju Vadakumchery |
2025-11-24 |
1,996 |
--
|
|
What is Third Party Risk Management (TPRM)?
|
Matthew Romero |
2025-07-01 |
3,219 |
--
|
|
Beyond Insider Risk: Operationalizing Identity Threat Response with Veza + CrowdStrike
|
Matthew Romero |
2025-09-16 |
635 |
--
|
|
Automating Veza Access Requests for the Enterprise: Integrating Veza with ServiceNow
|
Josh Welch & Thao Le |
2026-01-26 |
2,694 |
--
|
|
Taming the M&A Chaos: How Veza Addresses Identity Security Risks During Mergers, …
|
Quoc Hoang |
2026-01-26 |
2,157 |
--
|
|
Veza Product Updates – November 2025
|
Sameer Mehta |
2026-01-28 |
2,702 |
--
|
|
Veza Product Updates – January 2026
|
Sameer Mehta |
2026-02-12 |
2,711 |
--
|