50 blog posts published by month since the start of 2025. Start from a different year:

Blog URL
Posts year-to-date
50 (46 posts by this month last year.)
Average posts per month since 2025
4.2

Post details (2025 to today)

Title Author Date Word count HN points
Guide to Non-Human Identity Security Veza Jan 15, 2025 2445 -
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation Veza Jan 16, 2025 167 -
Veza Access AI – Applications of Gen AI for Identity Security Use Cases Shanmukh Sista Jan 21, 2025 2573 -
Modern Access Request Processes: Best Practices & What to Avoid in 2025 Veza Feb 03, 2025 3737 -
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation Veza Jan 16, 2025 167 -
What is NIST Compliance? Guide & Checklist [2025] Veza Feb 13, 2025 2703 -
Veza Product Updates – November 2024 Veza Feb 24, 2025 1710 -
The Evolution of Identity and Security at Workday: Insights from CISO Josh DeFigueiredo Veza Feb 27, 2025 585 -
10 top privileged access management (PAM) software solutions for 2025 Jared Blistein Jan 02, 2025 3894 -
How Veza Simplies SOX Compliance: Automating Access Controls & SoD Monitoring Amber Li Mar 07, 2025 1366 -
From Access Oversights to Audit Excellence: How Veza and Legacy IGA Secure SharePoint Environments Matthew Romero Mar 11, 2025 1177 -
Veza Product Updates – January Veza Jan 31, 2025 2520 -
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It Taylor Parsons Mar 25, 2025 979 -
From Access Oversights to Audit Excellence: How Veza and Legacy IGA Secure SharePoint Environments Matthew Romero Mar 11, 2025 1177 -
Achieving DORA Compliance: A Practical Guide for Financial Organizations Mike Towers Mar 24, 2025 1254 -
Reflections from Gartner IAM London: Visibility Leads to Observability Rob Rachwald Mar 25, 2025 424 -
Model Context Protocol (MCP): Implications on identity security and access risks for modern AI-powered apps Shanmukh Sista Mar 31, 2025 1690 -
Effortless Access Governance for Custom Apps with Veza: Boost Access Reviews with Automation Swetha Lakshmanan Apr 01, 2025 982 -
The Treasury Access Incident: Five Critical Lessons for Modern Identity Security Mike Towers Apr 04, 2025 1101 -
Transforming Access Lifecycle Management with Veza’s Access Profiles Sandler Rubin Apr 03, 2025 1054 -
AI Agents in the Enterprise and Their Implications for Identity Security Rich Dandliker Apr 08, 2025 2296 -
How Veza Strengthens SOC 1 Compliance: Common Control Failures & How to Fix Them Amber Li Apr 10, 2025 2160 -
Trust as the Foundation for Agentic AI Architecture: Securing Access to all the AI layers – Models, Infra, AI Applications Dr. Maohua Lu Apr 14, 2025 842 -
Veza Product Updates – February Veza Feb 13, 2025 2243 -
Simplifying CMMC 2.0 Compliance: Modern Access Control Strategies for Government Contractors Mike Towers Apr 18, 2025 1426 -
When Logging In Is the New Hacking: Nicole Perlroth on the Evolving Cyber Threat Landscape Veza Apr 21, 2025 496 -
The Third-Party Access Problem: The Elephant in the Room for Every CISO’s Identity Strategy Mike Towers Apr 25, 2025 1375 -
Least privilege demands that identity goes beyond IAM teams to app, data & security teams Tarun Thakur Apr 22, 2025 1167 -
Achieving Least Privilege at Scale: How OPAS Helps Enterprises Reduce Hidden Access Risks Santosh Kumar Apr 23, 2025 1764 -
Announcing Veza’s Series D: Securing Identities through Achieving Least Privilege Tarun Thakur Apr 28, 2025 681 -
Identity is Eating Security: Why Access Is the New Perimeter Mike Towers Apr 30, 2025 1024 -
The State of SaaS Security: Why Identity is the Critical Control Point Mike Towers May 06, 2025 824 -
Just-in-Time (JIT) Access with Veza Access Requests Sandler Rubin May 05, 2025 3441 -
Veza Product Updates – March Veza Mar 26, 2025 2235 -
Defending Against Volt Typhoon: A CISO’s Playbook with Veza’s Identity Security Platform Rob Rachwald May 23, 2025 904 -
What Are Non-Human Identities? Matthew Romero May 13, 2025 3087 -
Machine Identities: Definition, How They Work, and Security Best Practices Matthew Romero May 20, 2025 3277 -
How Veza Leverages Role Mining to Address the Evolving Needs of Identity Security and Empower SecOps Teams Matthew Romero May 14, 2025 1300 -
“Set It and Forget It” Access Control Is No Longer Enough Mike Towers May 16, 2025 966 -
From Crisis to Compliance: How Conifer Retail Rebuilt Trust with Identity-First PCI DSS 4.0 Governance Matthew Romero May 15, 2025 1154 -
Why Identity Is the Cornerstone of Zero Trust Architecture Tim Chase Jun 03, 2025 1716 -
Veza Product Updates – April Veza Apr 29, 2025 3044 -
What is identity and access management [2025 guide] Matthew Romero May 27, 2025 3556 -
I Attended the Verizon Data Breach Session at RSA So You Don’t Have To: Rob Rachwald May 30, 2025 884 -
Saviynt Review: Features, Flaws, and Smarter Identity Security Alternatives Quoc Hoang May 29, 2025 2755 -
Operationalizing the Identity Security Platform with Veza Actions Matthew Romero Jun 05, 2025 1069 -
Identity Crisis: The Rise of Machines Veza Jun 03, 2025 321 -
Operationalizing Identity Risk Insights with Veza + Microsoft Defender for Identity Matthew Romero Jun 10, 2025 1625 -
Veza Access Intelligence: Role Engineering for Modern Access Control Matthew Romero Jun 13, 2025 1382 -
Mind the Gap: Access Governance for Disconnected Apps Matthew Romero Jun 17, 2025 1156 -