Guide to Non-Human Identity Security |
Veza |
Jan 15, 2025 |
2445 |
- |
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation |
Veza |
Jan 16, 2025 |
167 |
- |
Veza Access AI – Applications of Gen AI for Identity Security Use Cases |
Shanmukh Sista |
Jan 21, 2025 |
2573 |
- |
Modern Access Request Processes: Best Practices & What to Avoid in 2025 |
Veza |
Feb 03, 2025 |
3737 |
- |
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation |
Veza |
Jan 16, 2025 |
167 |
- |
What is NIST Compliance? Guide & Checklist [2025] |
Veza |
Feb 13, 2025 |
2703 |
- |
Veza Product Updates – November 2024 |
Veza |
Feb 24, 2025 |
1710 |
- |
The Evolution of Identity and Security at Workday: Insights from CISO Josh DeFigueiredo |
Veza |
Feb 27, 2025 |
585 |
- |
10 top privileged access management (PAM) software solutions for 2025 |
Jared Blistein |
Jan 02, 2025 |
3894 |
- |
How Veza Simplies SOX Compliance: Automating Access Controls & SoD Monitoring |
Amber Li |
Mar 07, 2025 |
1366 |
- |
From Access Oversights to Audit Excellence: How Veza and Legacy IGA Secure SharePoint Environments |
Matthew Romero |
Mar 11, 2025 |
1177 |
- |
Veza Product Updates – January |
Veza |
Jan 31, 2025 |
2520 |
- |
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It |
Taylor Parsons |
Mar 25, 2025 |
979 |
- |
From Access Oversights to Audit Excellence: How Veza and Legacy IGA Secure SharePoint Environments |
Matthew Romero |
Mar 11, 2025 |
1177 |
- |
Achieving DORA Compliance: A Practical Guide for Financial Organizations |
Mike Towers |
Mar 24, 2025 |
1254 |
- |
Reflections from Gartner IAM London: Visibility Leads to Observability |
Rob Rachwald |
Mar 25, 2025 |
424 |
- |
Model Context Protocol (MCP): Implications on identity security and access risks for modern AI-powered apps |
Shanmukh Sista |
Mar 31, 2025 |
1690 |
- |
Effortless Access Governance for Custom Apps with Veza: Boost Access Reviews with Automation |
Swetha Lakshmanan |
Apr 01, 2025 |
982 |
- |
The Treasury Access Incident: Five Critical Lessons for Modern Identity Security |
Mike Towers |
Apr 04, 2025 |
1101 |
- |
Transforming Access Lifecycle Management with Veza’s Access Profiles |
Sandler Rubin |
Apr 03, 2025 |
1054 |
- |
AI Agents in the Enterprise and Their Implications for Identity Security |
Rich Dandliker |
Apr 08, 2025 |
2296 |
- |
How Veza Strengthens SOC 1 Compliance: Common Control Failures & How to Fix Them |
Amber Li |
Apr 10, 2025 |
2160 |
- |
Trust as the Foundation for Agentic AI Architecture: Securing Access to all the AI layers – Models, Infra, AI Applications |
Dr. Maohua Lu |
Apr 14, 2025 |
842 |
- |
Veza Product Updates – February |
Veza |
Feb 13, 2025 |
2243 |
- |
Simplifying CMMC 2.0 Compliance: Modern Access Control Strategies for Government Contractors |
Mike Towers |
Apr 18, 2025 |
1426 |
- |
When Logging In Is the New Hacking: Nicole Perlroth on the Evolving Cyber Threat Landscape |
Veza |
Apr 21, 2025 |
496 |
- |
The Third-Party Access Problem: The Elephant in the Room for Every CISO’s Identity Strategy |
Mike Towers |
Apr 25, 2025 |
1375 |
- |
Least privilege demands that identity goes beyond IAM teams to app, data & security teams |
Tarun Thakur |
Apr 22, 2025 |
1167 |
- |
Achieving Least Privilege at Scale: How OPAS Helps Enterprises Reduce Hidden Access Risks |
Santosh Kumar |
Apr 23, 2025 |
1764 |
- |