29 blog posts published by month since the start of 2025. Start from a different year:

Blog URL
Posts year-to-date
29 (30 posts by this month last year.)
Average posts per month since 2025
2.4

Post details (2025 to today)

Title Author Date Word count HN points
Guide to Non-Human Identity Security Veza Jan 15, 2025 2445 -
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation Veza Jan 16, 2025 167 -
Veza Access AI – Applications of Gen AI for Identity Security Use Cases Shanmukh Sista Jan 21, 2025 2573 -
Modern Access Request Processes: Best Practices & What to Avoid in 2025 Veza Feb 03, 2025 3737 -
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation Veza Jan 16, 2025 167 -
What is NIST Compliance? Guide & Checklist [2025] Veza Feb 13, 2025 2703 -
Veza Product Updates – November 2024 Veza Feb 24, 2025 1710 -
The Evolution of Identity and Security at Workday: Insights from CISO Josh DeFigueiredo Veza Feb 27, 2025 585 -
10 top privileged access management (PAM) software solutions for 2025 Jared Blistein Jan 02, 2025 3894 -
How Veza Simplies SOX Compliance: Automating Access Controls & SoD Monitoring Amber Li Mar 07, 2025 1366 -
From Access Oversights to Audit Excellence: How Veza and Legacy IGA Secure SharePoint Environments Matthew Romero Mar 11, 2025 1177 -
Veza Product Updates – January Veza Jan 31, 2025 2520 -
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It Taylor Parsons Mar 25, 2025 979 -
From Access Oversights to Audit Excellence: How Veza and Legacy IGA Secure SharePoint Environments Matthew Romero Mar 11, 2025 1177 -
Achieving DORA Compliance: A Practical Guide for Financial Organizations Mike Towers Mar 24, 2025 1254 -
Reflections from Gartner IAM London: Visibility Leads to Observability Rob Rachwald Mar 25, 2025 424 -
Model Context Protocol (MCP): Implications on identity security and access risks for modern AI-powered apps Shanmukh Sista Mar 31, 2025 1690 -
Effortless Access Governance for Custom Apps with Veza: Boost Access Reviews with Automation Swetha Lakshmanan Apr 01, 2025 982 -
The Treasury Access Incident: Five Critical Lessons for Modern Identity Security Mike Towers Apr 04, 2025 1101 -
Transforming Access Lifecycle Management with Veza’s Access Profiles Sandler Rubin Apr 03, 2025 1054 -
AI Agents in the Enterprise and Their Implications for Identity Security Rich Dandliker Apr 08, 2025 2296 -
How Veza Strengthens SOC 1 Compliance: Common Control Failures & How to Fix Them Amber Li Apr 10, 2025 2160 -
Trust as the Foundation for Agentic AI Architecture: Securing Access to all the AI layers – Models, Infra, AI Applications Dr. Maohua Lu Apr 14, 2025 842 -
Veza Product Updates – February Veza Feb 13, 2025 2243 -
Simplifying CMMC 2.0 Compliance: Modern Access Control Strategies for Government Contractors Mike Towers Apr 18, 2025 1426 -
When Logging In Is the New Hacking: Nicole Perlroth on the Evolving Cyber Threat Landscape Veza Apr 21, 2025 496 -
The Third-Party Access Problem: The Elephant in the Room for Every CISO’s Identity Strategy Mike Towers Apr 25, 2025 1375 -
Least privilege demands that identity goes beyond IAM teams to app, data & security teams Tarun Thakur Apr 22, 2025 1167 -
Achieving Least Privilege at Scale: How OPAS Helps Enterprises Reduce Hidden Access Risks Santosh Kumar Apr 23, 2025 1764 -