|
Guide to Non-Human Identity Security
|
Veza |
2025-01-15 |
2,445 |
--
|
|
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation
|
Veza |
2025-01-16 |
167 |
--
|
|
Veza Access AI – Applications of Gen AI for Identity Security Use …
|
Shanmukh Sista |
2025-01-21 |
2,573 |
--
|
|
Modern Access Request Processes: Best Practices & What to Avoid in 2025
|
Veza |
2025-02-03 |
3,737 |
--
|
|
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation
|
Veza |
2025-01-16 |
167 |
--
|
|
What is NIST Compliance? Guide & Checklist [2025]
|
Veza |
2025-02-13 |
2,703 |
--
|
|
Veza Product Updates – November 2024
|
Veza |
2025-02-24 |
1,710 |
--
|
|
The Evolution of Identity and Security at Workday: Insights from CISO Josh …
|
Veza |
2025-02-27 |
585 |
--
|
|
10 top privileged access management (PAM) software solutions for 2025
|
Jared Blistein |
2025-01-02 |
3,894 |
--
|
|
How Veza Simplies SOX Compliance: Automating Access Controls & SoD Monitoring
|
Amber Li |
2025-03-07 |
1,366 |
--
|
|
From Access Oversights to Audit Excellence: How Veza and Legacy IGA Secure …
|
Matthew Romero |
2025-03-11 |
1,177 |
--
|
|
Veza Product Updates – January
|
Veza |
2025-01-31 |
2,520 |
--
|
|
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent …
|
Taylor Parsons |
2025-03-25 |
979 |
--
|
|
From Access Oversights to Audit Excellence: How Veza and Legacy IGA Secure …
|
Matthew Romero |
2025-03-11 |
1,177 |
--
|
|
Achieving DORA Compliance: A Practical Guide for Financial Organizations
|
Mike Towers |
2025-03-24 |
1,254 |
--
|
|
Reflections from Gartner IAM London: Visibility Leads to Observability
|
Rob Rachwald |
2025-03-25 |
424 |
--
|
|
Model Context Protocol (MCP): Implications on identity security and access risks for …
|
Shanmukh Sista |
2025-03-31 |
1,690 |
--
|
|
Effortless Access Governance for Custom Apps with Veza: Boost Access Reviews with …
|
Swetha Lakshmanan |
2025-04-01 |
982 |
--
|
|
The Treasury Access Incident: Five Critical Lessons for Modern Identity Security
|
Mike Towers |
2025-04-04 |
1,101 |
--
|
|
Transforming Access Lifecycle Management with Veza’s Access Profiles
|
Sandler Rubin |
2025-04-03 |
1,054 |
--
|
|
AI Agents in the Enterprise and Their Implications for Identity Security
|
Rich Dandliker |
2025-04-08 |
2,296 |
--
|
|
How Veza Strengthens SOC 1 Compliance: Common Control Failures & How to …
|
Amber Li |
2025-04-10 |
2,160 |
--
|
|
Trust as the Foundation for Agentic AI Architecture: Securing Access to all …
|
Dr. Maohua Lu |
2025-04-14 |
842 |
--
|
|
Veza Product Updates – February
|
Veza |
2025-02-13 |
2,243 |
--
|
|
Simplifying CMMC 2.0 Compliance: Modern Access Control Strategies for Government Contractors
|
Mike Towers |
2025-04-18 |
1,426 |
--
|
|
When Logging In Is the New Hacking: Nicole Perlroth on the Evolving …
|
Veza |
2025-04-21 |
496 |
--
|
|
The Third-Party Access Problem: The Elephant in the Room for Every CISO’s …
|
Mike Towers |
2025-04-25 |
1,375 |
--
|
|
Least privilege demands that identity goes beyond IAM teams to app, data …
|
Tarun Thakur |
2025-04-22 |
1,167 |
--
|
|
Achieving Least Privilege at Scale: How OPAS Helps Enterprises Reduce Hidden Access …
|
Santosh Kumar |
2025-04-23 |
1,764 |
--
|
|
Announcing Veza’s Series D: Securing Identities through Achieving Least Privilege
|
Tarun Thakur |
2025-04-28 |
681 |
--
|
|
Identity is Eating Security: Why Access Is the New Perimeter
|
Mike Towers |
2025-04-30 |
1,024 |
--
|
|
The State of SaaS Security: Why Identity is the Critical Control Point
|
Mike Towers |
2025-05-06 |
824 |
--
|
|
Just-in-Time (JIT) Access with Veza Access Requests
|
Sandler Rubin |
2025-05-05 |
3,441 |
--
|
|
Veza Product Updates – March
|
Veza |
2025-03-26 |
2,235 |
--
|
|
Defending Against Volt Typhoon: A CISO’s Playbook with Veza’s Identity Security Platform
|
Rob Rachwald |
2025-05-23 |
904 |
--
|
|
What Are Non-Human Identities?
|
Matthew Romero |
2025-05-13 |
3,087 |
--
|
|
Machine Identities: Definition, How They Work, and Security Best Practices
|
Matthew Romero |
2025-05-20 |
3,277 |
--
|
|
How Veza Leverages Role Mining to Address the Evolving Needs of Identity …
|
Matthew Romero |
2025-05-14 |
1,300 |
--
|
|
“Set It and Forget It” Access Control Is No Longer Enough
|
Mike Towers |
2025-05-16 |
966 |
--
|
|
From Crisis to Compliance: How Conifer Retail Rebuilt Trust with Identity-First PCI …
|
Matthew Romero |
2025-05-15 |
1,154 |
--
|
|
Why Identity Is the Cornerstone of Zero Trust Architecture
|
Tim Chase |
2025-06-03 |
1,716 |
--
|
|
Veza Product Updates – April
|
Veza |
2025-04-29 |
3,044 |
--
|
|
What is identity and access management [2025 guide]
|
Matthew Romero |
2025-05-27 |
3,556 |
--
|
|
I Attended the Verizon Data Breach Session at RSA So You Don’t …
|
Rob Rachwald |
2025-05-30 |
884 |
--
|
|
Saviynt Review: Features, Flaws, and Smarter Identity Security Alternatives
|
Quoc Hoang |
2025-05-29 |
2,755 |
--
|
|
Operationalizing the Identity Security Platform with Veza Actions
|
Matthew Romero |
2025-06-05 |
1,069 |
--
|
|
Identity Crisis: The Rise of Machines
|
Veza |
2025-06-03 |
321 |
--
|
|
Operationalizing Identity Risk Insights with Veza + Microsoft Defender for Identity
|
Matthew Romero |
2025-06-10 |
1,625 |
--
|
|
Veza Access Intelligence: Role Engineering for Modern Access Control
|
Matthew Romero |
2025-06-13 |
1,382 |
--
|
|
Mind the Gap: Access Governance for Disconnected Apps
|
Matthew Romero |
2025-06-17 |
1,156 |
--
|
|
How AI Is Reshaping Identity Security: Opportunities and New Threats
|
Mike Towers |
2025-08-08 |
1,609 |
--
|
|
Veza Product Updates – August 2025
|
Veza |
2025-10-15 |
2,833 |
--
|
|
The Trust Dividend: How Security Leaders Build Enterprise Value
|
Mike Towers |
2025-07-25 |
1,853 |
--
|
|
All the Keys, Visualized: Governing 90+ Non-Human Identities
|
Matthew Romero |
2025-10-16 |
1,219 |
--
|
|
DOJ’s Bulk Data Transfer Rule: Why Identity Visibility is Now a Compliance …
|
Rob Rachwald |
2025-08-28 |
1,040 |
--
|
|
When Identities Turn Against You: Building an Insider Threat Program for the …
|
Nathan Casey |
2025-10-24 |
1,257 |
--
|
|
Inside Gartner’s 2025 Hype Cycle for Digital Identity: Why IVIP and AI …
|
Matthew Romero |
2025-07-29 |
1,066 |
--
|
|
11 Best Zero Trust Providers for 2026
|
Matthew Romero |
2025-12-30 |
2,555 |
--
|
|
NHI 2×2 Framework: From Blind Spots to Closed Loops
|
Matthew Romero |
2025-10-21 |
1,406 |
--
|
|
ServiceNow + Veza: A new chapter in identity security
|
Veza |
2025-12-02 |
1,112 |
--
|
|
The Security Paradox of Data and Digital Transformation
|
Mike Towers |
2025-08-15 |
1,344 |
--
|
|
The SharePoint Blind Spot: How Legacy IGA Failed to Stop Volt Typhoon
|
Mike Towers |
2025-08-29 |
1,171 |
--
|
|
Why Analysts Keep Pointing To Veza as the Leader In The New …
|
Matthew Romero |
2025-12-16 |
2,713 |
--
|
|
Identity Visibility and Intelligence Platforms (IVIP): The Missing Layer in the IAM …
|
Rob Rachwald |
2025-07-08 |
1,244 |
--
|
|
What is Cloud Identity Security? Key Considerations
|
Rob Rachwald |
2025-08-07 |
2,581 |
--
|
|
Identity Is the Entry Point: How UNC3944 Breached vSphere Without Malware
|
Rob Rachwald |
2025-07-30 |
1,921 |
--
|
|
How To Choose the Right Data Governance Tools [2025]
|
Matthew Romero |
2025-09-18 |
1,445 |
--
|
|
Ransomware Isn’t Just Malware Anymore – It’s an Identity Problem
|
Matthew Romero |
2025-09-11 |
857 |
--
|
|
Enrichment Rules in Veza: Automating Context for Smarter Identity Governance
|
Matthew Romero |
2025-08-12 |
1,093 |
--
|
|
Veza Access AI Powered Universal Search for all Identity Security Use Cases
|
Shanmukh Sista |
2025-08-13 |
546 |
--
|
|
On-demand Access Reviews
|
Bradley Creado |
2025-11-07 |
2,060 |
--
|
|
12 Best Identity Security Software [2025]
|
Quoc Hoang |
2025-06-20 |
3,272 |
--
|
|
Veza Product Updates – May
|
Veza |
2025-05-29 |
2,860 |
--
|
|
Better Together: Augmenting SailPoint with Full-Stack Access Visibility
|
Matthew Romero |
2025-06-27 |
1,352 |
--
|
|
Forrester Recognizes Veza for IGA, ISPM, and NHI/AI Identity Management
|
Veza |
2026-01-15 |
962 |
--
|
|
Overcoming Identity Silos: Toward Unified Identity Security
|
Mike Towers |
2025-08-22 |
1,835 |
--
|
|
7 user access review software tools to know in 2025
|
Quoc Hoang |
2025-07-24 |
2,494 |
--
|
|
Veza’s Risk-Based Access Reviews and Recertifications
|
Bradley Creado |
2025-10-17 |
848 |
--
|
|
From Visibility to Automation: Achieving True Least Privilege Access with Veza’s Access …
|
Varun Ramesh Athreya |
2025-10-29 |
1,756 |
--
|
|
Veza Access AI to manage Access Risks of AI Agents
|
Kumar Saurabh Arora |
2025-07-29 |
788 |
--
|
|
AI Agents Are Becoming Your New Privileged Workforce
|
Dr. Maohua Lu |
2025-12-09 |
1,192 |
--
|
|
Azure access control and compliance: a practical guide for intelligent access
|
Matthew Romero |
2025-09-25 |
2,175 |
--
|
|
Veza Product Updates – September 2025
|
Sameer Mehta |
2025-11-04 |
2,966 |
--
|
|
What Is an Identity Visibility and Intelligence Platform (IVIP)?
|
Matthew Romero |
2025-07-17 |
1,667 |
--
|
|
What is Light IGA? Is it the right security solution for you?
|
Matthew Romero |
2025-10-02 |
1,069 |
--
|
|
Decoding the OCC’s Spring 2025 Risk Report: Why Identity Security Must Be …
|
Zachary Wilson |
2025-08-07 |
1,504 |
--
|
|
Risk 2.0: Evolving How We Visualize and Act on Identity Risk
|
Atul Pol |
2026-01-07 |
1,624 |
--
|
|
Privilege Creep: What It Is and How To Prevent It
|
Matthew Romero |
2025-08-14 |
1,343 |
--
|
|
Veza Product Updates – October 2025
|
Sameer Mehta |
2025-12-09 |
2,058 |
--
|
|
2025: The Year of Product Innovation
|
Sameer Mehta |
2026-01-11 |
1,568 |
--
|
|
Defining Access: Roles and Controls in Veza Access Reviews
|
Bradley Creado |
2025-11-17 |
2,183 |
--
|
|
Veza Product Updates – July 2025
|
Veza |
2025-10-07 |
2,457 |
--
|
|
The Power of Multi-Level User Access Reviews
|
Biju Vadakumchery |
2025-10-24 |
1,584 |
--
|
|
Closing the Gap Between Threat Detection and Identity Risk
|
Matthew Romero |
2025-08-21 |
823 |
--
|
|
Veza for Security Operations: Make Identity Operational
|
Matthew Romero |
2025-09-29 |
868 |
--
|
|
Identity is the New Security Perimeter
|
Ellen James |
2025-07-28 |
629 |
--
|
|
Veza Product Updates – June 2025
|
Veza |
2025-09-18 |
3,276 |
--
|
|
Unlocking App Onboarding at Scale: The Power of Veza’s 300+ Integrations and …
|
Matthew Romero |
2025-07-31 |
1,096 |
--
|
|
17 Best data governance tools [2025 review]
|
Quoc Hoang |
2025-06-23 |
3,063 |
--
|
|
NHI Ownership: Solving the “Who Owns This Bot?” Problem
|
Matthew Romero |
2025-10-14 |
2,326 |
--
|
|
Understanding ISPM: Closing the Identity Gap with Identity Security Posture Management
|
Matthew Romero |
2025-07-16 |
1,937 |
--
|
|
Introducing Access AI powered Access Risk Analysis
|
Shanmukh Sista |
2025-09-16 |
629 |
--
|
|
The Hidden Cost of Over-Provisioned Access: Identity’s Role in Cloud Optimization
|
Mike Towers |
2025-08-01 |
1,485 |
--
|
|
Simplify Access Reviews with Veza’s Intelligent Notification Framework
|
Biju Vadakumchery |
2025-10-31 |
1,985 |
--
|
|
They’re Not Hacking In, They’re Logging In: Ensure Your Insurability in the …
|
Naren Vaideeswaran |
2025-10-08 |
898 |
--
|
|
The NHI Iceberg: Veza NHI Security brings visibility and actionability of the …
|
Kumar Saurabh Arora |
2025-08-14 |
665 |
--
|
|
Looking ahead to 2026
|
Tarun Thakur |
2026-01-06 |
722 |
--
|
|
Identity Is the New Control Plane
|
Matthew Romero |
2025-12-23 |
1,011 |
--
|
|
Stopping Insider Risk in Its Tracks with Veza + CrowdStrike Falcon
|
Matthew Romero |
2025-06-19 |
905 |
--
|
|
Is Your IGA Solution Stuck in the Past? Time for an Upgrade
|
Sandler Rubin |
2025-06-24 |
1,968 |
--
|
|
Access Control Compliance Guide for IT Professionals [2025 Review]
|
Matthew Romero |
2025-07-22 |
4,734 |
--
|
|
How Does Veza Support the Identity Visibility and Intelligence Platform (IVIP) Model?
|
Matthew Romero |
2025-08-05 |
978 |
--
|
|
Veza for Oracle Applications: Solving the Access Management Puzzle
|
Jim Lester |
2025-07-15 |
1,368 |
--
|
|
How to Govern OpenAI Access While Enforcing Least Privilege: Three Enterprise Perspectives
|
Matthew Romero |
2025-09-05 |
779 |
--
|
|
How AI is impacting identity security and privileged access management in 2025
|
Matthew Romero |
2025-08-06 |
2,118 |
--
|
|
Identity Attack Surface Analysis: Securing the New Perimeter
|
Nathan Casey |
2025-07-10 |
2,308 |
--
|
|
From Exposed to Reinvention-Ready: Why Identity Security Is the Foundation of AI …
|
Mike Towers |
2025-07-03 |
1,202 |
--
|
|
Decoding Identity Security for AI Security Posture Management (AISPM)
|
Dr. Maohua Lu |
2025-10-29 |
993 |
--
|
|
Introducing VQL – Veza Query Language
|
Amber Li |
2025-08-26 |
1,373 |
--
|
|
How Revocation, Remediation, and Reconciliation Work in Veza Access Reviews
|
Biju Vadakumchery |
2025-11-24 |
1,996 |
--
|
|
What is Third Party Risk Management (TPRM)?
|
Matthew Romero |
2025-07-01 |
3,219 |
--
|
|
Beyond Insider Risk: Operationalizing Identity Threat Response with Veza + CrowdStrike
|
Matthew Romero |
2025-09-16 |
635 |
--
|
|
Automating Veza Access Requests for the Enterprise: Integrating Veza with ServiceNow
|
Josh Welch & Thao Le |
2026-01-26 |
2,694 |
--
|
|
Taming the M&A Chaos: How Veza Addresses Identity Security Risks During Mergers, …
|
Quoc Hoang |
2026-01-26 |
2,157 |
--
|
|
Veza Product Updates – November 2025
|
Sameer Mehta |
2026-01-28 |
2,702 |
--
|
|
Veza Product Updates – January 2026
|
Sameer Mehta |
2026-02-12 |
2,711 |
--
|