Guide to Non-Human Identity Security |
Veza |
Jan 15, 2025 |
2445 |
- |
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation |
Veza |
Jan 16, 2025 |
167 |
- |
Veza Access AI – Applications of Gen AI for Identity Security Use Cases |
Shanmukh Sista |
Jan 21, 2025 |
2573 |
- |
Modern Access Request Processes: Best Practices & What to Avoid in 2025 |
Veza |
Feb 03, 2025 |
3737 |
- |
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation |
Veza |
Jan 16, 2025 |
167 |
- |
What is NIST Compliance? Guide & Checklist [2025] |
Veza |
Feb 13, 2025 |
2703 |
- |
Veza Product Updates – November 2024 |
Veza |
Feb 24, 2025 |
1710 |
- |
The Evolution of Identity and Security at Workday: Insights from CISO Josh DeFigueiredo |
Veza |
Feb 27, 2025 |
585 |
- |
10 top privileged access management (PAM) software solutions for 2025 |
Jared Blistein |
Jan 02, 2025 |
3894 |
- |
How Veza Simplies SOX Compliance: Automating Access Controls & SoD Monitoring |
Amber Li |
Mar 07, 2025 |
1366 |
- |
From Access Oversights to Audit Excellence: How Veza and Legacy IGA Secure SharePoint Environments |
Matthew Romero |
Mar 11, 2025 |
1177 |
- |
Veza Product Updates – January |
Veza |
Jan 31, 2025 |
2520 |
- |
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It |
Taylor Parsons |
Mar 25, 2025 |
979 |
- |
From Access Oversights to Audit Excellence: How Veza and Legacy IGA Secure SharePoint Environments |
Matthew Romero |
Mar 11, 2025 |
1177 |
- |
Achieving DORA Compliance: A Practical Guide for Financial Organizations |
Mike Towers |
Mar 24, 2025 |
1254 |
- |
Reflections from Gartner IAM London: Visibility Leads to Observability |
Rob Rachwald |
Mar 25, 2025 |
424 |
- |
Model Context Protocol (MCP): Implications on identity security and access risks for modern AI-powered apps |
Shanmukh Sista |
Mar 31, 2025 |
1690 |
- |
Effortless Access Governance for Custom Apps with Veza: Boost Access Reviews with Automation |
Swetha Lakshmanan |
Apr 01, 2025 |
982 |
- |
The Treasury Access Incident: Five Critical Lessons for Modern Identity Security |
Mike Towers |
Apr 04, 2025 |
1101 |
- |
Transforming Access Lifecycle Management with Veza’s Access Profiles |
Sandler Rubin |
Apr 03, 2025 |
1054 |
- |
AI Agents in the Enterprise and Their Implications for Identity Security |
Rich Dandliker |
Apr 08, 2025 |
2296 |
- |
How Veza Strengthens SOC 1 Compliance: Common Control Failures & How to Fix Them |
Amber Li |
Apr 10, 2025 |
2160 |
- |
Trust as the Foundation for Agentic AI Architecture: Securing Access to all the AI layers – Models, Infra, AI Applications |
Dr. Maohua Lu |
Apr 14, 2025 |
842 |
- |
Veza Product Updates – February |
Veza |
Feb 13, 2025 |
2243 |
- |
Simplifying CMMC 2.0 Compliance: Modern Access Control Strategies for Government Contractors |
Mike Towers |
Apr 18, 2025 |
1426 |
- |
When Logging In Is the New Hacking: Nicole Perlroth on the Evolving Cyber Threat Landscape |
Veza |
Apr 21, 2025 |
496 |
- |
The Third-Party Access Problem: The Elephant in the Room for Every CISO’s Identity Strategy |
Mike Towers |
Apr 25, 2025 |
1375 |
- |
Least privilege demands that identity goes beyond IAM teams to app, data & security teams |
Tarun Thakur |
Apr 22, 2025 |
1167 |
- |
Achieving Least Privilege at Scale: How OPAS Helps Enterprises Reduce Hidden Access Risks |
Santosh Kumar |
Apr 23, 2025 |
1764 |
- |
Announcing Veza’s Series D: Securing Identities through Achieving Least Privilege |
Tarun Thakur |
Apr 28, 2025 |
681 |
- |
Identity is Eating Security: Why Access Is the New Perimeter |
Mike Towers |
Apr 30, 2025 |
1024 |
- |
The State of SaaS Security: Why Identity is the Critical Control Point |
Mike Towers |
May 06, 2025 |
824 |
- |
Just-in-Time (JIT) Access with Veza Access Requests |
Sandler Rubin |
May 05, 2025 |
3441 |
- |
Veza Product Updates – March |
Veza |
Mar 26, 2025 |
2235 |
- |
Defending Against Volt Typhoon: A CISO’s Playbook with Veza’s Identity Security Platform |
Rob Rachwald |
May 23, 2025 |
904 |
- |
What Are Non-Human Identities? |
Matthew Romero |
May 13, 2025 |
3087 |
- |
Machine Identities: Definition, How They Work, and Security Best Practices |
Matthew Romero |
May 20, 2025 |
3277 |
- |
How Veza Leverages Role Mining to Address the Evolving Needs of Identity Security and Empower SecOps Teams |
Matthew Romero |
May 14, 2025 |
1300 |
- |
“Set It and Forget It” Access Control Is No Longer Enough |
Mike Towers |
May 16, 2025 |
966 |
- |
From Crisis to Compliance: How Conifer Retail Rebuilt Trust with Identity-First PCI DSS 4.0 Governance |
Matthew Romero |
May 15, 2025 |
1154 |
- |
Why Identity Is the Cornerstone of Zero Trust Architecture |
Tim Chase |
Jun 03, 2025 |
1716 |
- |
Veza Product Updates – April |
Veza |
Apr 29, 2025 |
3044 |
- |
What is identity and access management [2025 guide] |
Matthew Romero |
May 27, 2025 |
3556 |
- |
I Attended the Verizon Data Breach Session at RSA So You Don’t Have To: |
Rob Rachwald |
May 30, 2025 |
884 |
- |
Saviynt Review: Features, Flaws, and Smarter Identity Security Alternatives |
Quoc Hoang |
May 29, 2025 |
2755 |
- |
Operationalizing the Identity Security Platform with Veza Actions |
Matthew Romero |
Jun 05, 2025 |
1069 |
- |
Identity Crisis: The Rise of Machines |
Veza |
Jun 03, 2025 |
321 |
- |
Operationalizing Identity Risk Insights with Veza + Microsoft Defender for Identity |
Matthew Romero |
Jun 10, 2025 |
1625 |
- |
Veza Access Intelligence: Role Engineering for Modern Access Control |
Matthew Romero |
Jun 13, 2025 |
1382 |
- |
Mind the Gap: Access Governance for Disconnected Apps |
Matthew Romero |
Jun 17, 2025 |
1156 |
- |