Employee Spotlight: Teju Shyamsundar, Head of Product Marketing |
Josh Ashton |
Oct. 10, 2022 |
1031 |
- |
Employee Spotlight: Bobby Jackson, Regional Sales Director |
Josh Ashton |
Sep. 22, 2022 |
489 |
- |
Veza Has Passed a New Milestone as it Modernizes Identity Security |
Jason Garoutte |
Jun. 22, 2023 |
1602 |
- |
Three key lessons from last week's Okta breach |
Kale Bogdanovs |
Oct. 27, 2023 |
950 |
- |
A Practitioner’s Guide to Intelligent Access |
Tarun Thakur |
Dec. 20, 2023 |
876 |
- |
Why I’m excited about the future of Veza |
Niels Provos |
May. 03, 2022 |
808 |
- |
Join Us at Oktane: Explore “Bad Permissions” and Veza’s Access Solutions |
Veza |
Sep. 20, 2023 |
225 |
- |
Identity Security Spotlight: Delinea acquires Fastpath |
Veza |
Feb. 26, 2024 |
337 |
- |
Identity Security Spotlight: Cisco announces “Identity Intelligence” |
Veza |
Feb. 08, 2024 |
41 |
- |
Lessons from the breach: Microsoft and Midnight Blizzard |
Veza |
Feb. 21, 2024 |
341 |
- |
Cybersecurity Theater: The Show Must (Not) Go On |
Teju Shyamsundar |
Oct. 19, 2022 |
1138 |
- |
Identity Security Spotlight: Midnight Blizzard’s breach of Microsoft |
Veza |
Feb. 07, 2024 |
340 |
- |
Snowflake security: how to manage entitlement creep |
Kale Bogdanovs |
Feb. 28, 2023 |
1659 |
- |
Veza @ Snowflake Summit – June 26-29 |
Regina Soller-Gould |
Jun. 23, 2023 |
107 |
- |
Three tips for collaborating safely in Slack |
Kale Bogdanovs |
Feb. 22, 2023 |
1326 |
- |
5 Actionable Strategies to Improve Security Posture |
Eugene Feldman |
Dec. 01, 2023 |
438 |
- |
Six takeaways from the Gartner IT Symposium 2023 |
Jason Garoutte |
Oct. 27, 2023 |
2019 |
- |
The Veza Voice – December Issue |
Kale Bogdanovs |
Dec. 15, 2022 |
948 |
- |
Beyond IAM: Zero Trust Needs A Second Act in Identity |
Rich Dandliker |
Mar. 20, 2023 |
1330 |
- |
Can you make sense of permissions in AWS? |
Kale Bogdanovs |
Nov. 17, 2023 |
996 |
- |
RBAC vs ABAC: Access Control Explained |
Kale Bogdanovs |
Aug. 15, 2022 |
1697 |
- |
Authorization: The Missing Piece of Cloud Security |
Teju Shyamsundar |
Apr. 07, 2022 |
1357 |
- |
Why Veza, Why Now? |
Tarun Thakur |
Oct. 10, 2023 |
1321 |
- |
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence |
Tarun Thakur |
Jul. 21, 2023 |
644 |
- |
Veza @ AWS re:Invent |
Regina Soller-Gould |
Nov. 06, 2023 |
195 |
- |
Three key lessons from unauthorized access to Okta’s support system |
Kale Bogdanovs |
Oct. 27, 2023 |
906 |
- |
The Principle of Least Privilege Explained |
Kale Bogdanovs |
May. 25, 2023 |
3042 |
- |
What is Access Governance? A 2024 overview |
Jared Blistein |
Feb. 23, 2024 |
2220 |
- |
How to leverage Intelligent Access to de-risk the breach |
Rich Dandliker |
Jan. 02, 2024 |
776 |
- |
The Fundamentals of a Data-Centric Approach to Cloud Security |
Teju Shyamsundar |
Jun. 07, 2022 |
1425 |
- |
The Veza Voice – February issue |
Mike Bartholomy |
Mar. 01, 2023 |
1229 |
- |
The Veza Voice – May Issue |
Dr. Maohua Lu |
May. 31, 2023 |
966 |
- |
Understanding and protecting against the rising threat of Whale Phishing |
Ellen Falltrick |
Feb. 27, 2023 |
1884 |
- |
What Least Privilege Means in Practice |
Teju Shyamsundar |
Apr. 25, 2022 |
1111 |
- |
Digital Transformation and the Data Authorization Imperative |
Yousuf Khan |
May. 05, 2022 |
892 |
- |
How to secure access to your source code in GitHub |
Rich Dandliker |
Mar. 01, 2023 |
1294 |
- |
Data Security: The Challenge of Securing Service Accounts |
AK Khan |
May. 04, 2022 |
1104 |
- |
Veza @ Fal.Con 2023 |
Regina Soller-Gould |
Sep. 11, 2023 |
152 |
- |
The year of Intelligent Access |
Tarun Thakur |
Dec. 20, 2023 |
1402 |
- |
A field guide to bad permissions, part 3: excessive permissions |
Kale Bogdanovs |
Dec. 16, 2023 |
1243 |
- |
History of Hacks: SSRF attacks on AWS |
Ellen Falltrick |
May. 31, 2023 |
85 |
- |
Veza at RSA |
Regina Soller-Gould |
Apr. 05, 2023 |
188 |
- |
Into the VezaVerse: SaaS access security & governance |
Kale Bogdanovs |
May. 25, 2023 |
201 |
- |
The Next Wave of Implementing Zero Trust: Moving from Authentication to Authorization |
Rich Dandliker |
May. 31, 2022 |
1723 |
- |
The hard thing about Zero Trust |
Jason Garoutte |
Mar. 20, 2023 |
546 |
- |
Authorization – The New Age of Cloud Identity |
Cody Sanford |
May. 11, 2022 |
911 |
- |
Five ways to stop ransomware attacks |
Kale Bogdanovs |
May. 19, 2023 |
2167 |
- |
Welcome, Phil Venables, to the Veza Board of Directors! |
Tarun Thakur |
Jul. 19, 2023 |
986 |
- |
Veza Welcomes Gertie the Goat to Board of Advisors |
Veza |
Apr. 01, 2023 |
499 |
- |
A field guide to bad permissions, part 1: ungoverned permissions |
Kale Bogdanovs |
Nov. 21, 2023 |
1219 |
- |
Security Predictions for 2023 and Beyond |
Tarun Thakur |
Jan. 06, 2023 |
682 |
- |
A field guide to bad permissions part 4: policy-violating permissions |
Kale Bogdanovs |
Dec. 21, 2023 |
1026 |
- |
Identity Targeting: A Growing Threat with Rachel Wilson | Ep 1 |
Veza |
Oct. 05, 2023 |
378 |
- |
Disrupting Breaches and Advancing InfoSec with David Tyburski | Ep 2 |
Veza |
Oct. 20, 2023 |
389 |
- |
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence |
Tarun Thakur |
Jan. 31, 2024 |
644 |
- |
Integrate custom applications into a single control plane for authorization, with Open Authorization API |
Jim Lester |
Jan. 09, 2023 |
1267 |
- |
AWS Verified Permissions release points towards the “Beyond IAM” era |
Kale Bogdanovs |
Jun. 23, 2023 |
986 |
- |
Veza @ Gartner Symposium — October 15-19 |
Regina Soller-Gould |
Oct. 25, 2023 |
219 |
- |
Why I Put My Hoof Down & Joined Veza |
Gertie the Goat |
Mar. 20, 2023 |
907 |
- |
User Access Reviews: How They Work & Best Practices |
Alisa Ho |
Feb. 16, 2024 |
2516 |
- |
What is identity security and why is it so complicated? |
Eugene Feldman |
Dec. 08, 2023 |
1125 |
- |
A field guide to bad permissions part 2: expired permissions |
Kale Bogdanovs |
Nov. 30, 2023 |
1219 |
- |
Veza Product Update – April 2023 |
Dr. Maohua Lu |
May. 12, 2023 |
758 |
- |
The Five Tenets of Next-Gen IGA |
Jason Garoutte |
Nov. 20, 2023 |
2312 |
- |
The Veza Voice – January Issue |
Mike Bartholomy |
Jan. 30, 2023 |
722 |
- |
Rethinking Data Security with Veza |
Craig Rosen |
May. 05, 2022 |
941 |
- |
Ransomware supply chain threats: What made a global automotive company shut their plants this past spring? |
Teju Shyamsundar |
Oct. 07, 2022 |
1048 |
- |
Welcome to the Identity Radicals Podcast |
Veza |
Sep. 27, 2023 |
196 |
- |
Solving the Long-Tail Integration Problem with an Open Platform Strategy: Meet the Open Authorization API (OAA) |
Rich Dandliker |
Apr. 26, 2022 |
1365 |
- |
Identiverse 2022 – where are we after a rapid move to cloud data? |
Teju Shyamsundar |
Jul. 07, 2022 |
840 |
- |
Authorization, NOT Authentication: the critical backbone for zero-trust security |
Tarek Khaled |
May. 10, 2022 |
1511 |
- |
Snowflake security: how to manage and secure data access at scale |
Kale Bogdanovs |
Feb. 21, 2023 |
1268 |
- |
History of Hacks: Outmaneuvering MFA |
Ellen Falltrick |
Jun. 07, 2023 |
98 |
- |
The Age of Identity Security is here: Microsoft goes all-in on identity with Microsoft Entra |
Brian Schwarz |
Jul. 28, 2023 |
644 |
- |
Veza Product Update – June 2023 |
Dr. Maohua Lu |
Jul. 26, 2023 |
900 |
- |
The Basics of AWS IAM – Keeping Cloud Expansion Secure with Identity and Access Management for AWS |
Kale Bogdanovs |
Apr. 22, 2022 |
1679 |
- |
Find and eliminate direct assignment of apps in your identity platform. |
Kale Bogdanovs |
Mar. 10, 2023 |
111 |
- |
Why it’s Important to Understand Effective Permissions |
David “Wick” Sedgwick |
Apr. 25, 2022 |
1413 |
- |
Security’s Next Frontier – Modernizing Data Security through Authorization for a Cloud-First Future |
Rich Dandliker |
Apr. 22, 2022 |
1047 |
- |
Into the VezaVerse: Veza for Slack |
Kale Bogdanovs |
Jan. 31, 2023 |
136 |
- |
Identity-Security Trends: Expectations vs Reality in Securing Data |
Teju Shyamsundar |
Jul. 26, 2022 |
845 |
- |
Veza at Gartner IAM |
Regina Soller-Gould |
Mar. 20, 2023 |
257 |
- |
5 Keys To Securing Your Data in a Multi-Cloud Environment |
Teju Shyamsundar |
Jun. 14, 2022 |
1068 |
- |
History of Hacks: Orphaned Accounts |
Ellen Falltrick |
Aug. 01, 2023 |
98 |
- |
The Veza Voice – March Issue |
Mike Bartholomy |
Apr. 11, 2023 |
1053 |
- |
BlackHat USA 2022 Recap – 25 years of InfoSec |
Teju Shyamsundar |
Sep. 14, 2022 |
556 |
- |
The Identity Authorization Approach to SaaS Access Governance |
Ellen Falltrick |
May. 03, 2023 |
1718 |
- |
How strong is your SaaS Security Posture Management (SSPM)? |
Ellen Falltrick |
Apr. 12, 2023 |
2410 |
- |
Decoding Data Sovereignty with Jenner Holden | Ep 3 |
Veza |
Nov. 02, 2023 |
430 |
- |
Veza’s Founding Principles |
Kale Bogdanovs |
Apr. 06, 2022 |
737 |
- |
Introducing Veza — Our Quest to Advance the Data Security Industry for Decades to Come |
Tarun Thakur |
Apr. 27, 2022 |
1361 |
- |
Product updates: 2H Release Summary |
Dr. Maohua Lu |
Jan. 05, 2024 |
1001 |
- |
Veza Secures Strategic Investment from Capital One Ventures and ServiceNow Ventures to Accelerate Identity Security |
Tarun Thakur |
Aug. 10, 2023 |
983 |
- |
The Limits of “Man-in-the-Middle” Architecture for Authorization |
Rich Dandliker |
Jan. 25, 2023 |
625 |
- |
Building Veza’s Platform and Products |
Tarun Thakur |
Aug. 15, 2023 |
996 |
- |
Veza @ AWS re:Inforce June 13-14 |
Regina Soller-Gould |
Jun. 07, 2023 |
152 |
- |
What is data security? |
Teju Shyamsundar |
May. 24, 2022 |
1220 |
- |
Defend Against Ransomware with Authorization |
Monica Armand |
Nov. 03, 2022 |
658 |
- |
Salesforce security, roles, privileged access management, and more |
Veza |
Mar. 08, 2022 |
1985 |
- |
Join us at RSAC May 6-9, 2024 |
Veza |
Mar. 13, 2024 |
154 |
- |
GitHub Access Control, Access Management, Security, Roles, Authorization & More |
Veza |
Mar. 15, 2024 |
1811 |
- |
Veza welcomes Mike Towers as Chief Security & Trust Officer |
Veza |
Mar. 15, 2024 |
70 |
- |
Veza for Zscaler: Bringing least privilege to ZIA |
Veza |
Mar. 22, 2024 |
342 |
- |
Invisible keyholders: the importance of Non-Human Identity Management |
Mike Towers |
Mar. 22, 2024 |
780 |
- |
What is Identity Security? |
Veza |
Mar. 29, 2024 |
2303 |
- |
Key Takeaways: FBI Breach Prevention Tips |
Veza |
Apr. 10, 2024 |
918 |
- |
Veza for HashiCorp Vault: Bringing least privilege to Vault and Secrets |
Tarun Thakur |
Apr. 12, 2024 |
386 |
- |
Veza for Crowdstrike: Identify, triage and remediate in minutes |
Tarun Thakur |
Apr. 12, 2024 |
217 |
- |
Complete Snowflake Review: Roles, Security & Access Control |
Veza |
Apr. 12, 2024 |
1971 |
- |
Veza Product Updates – February 2024 |
Dr. Maohua Lu |
Apr. 15, 2024 |
689 |
- |
Identity Security Posture Management |
Tarun Thakur |
Apr. 18, 2024 |
598 |
- |
What is non-human identity management |
Veza |
Apr. 19, 2024 |
2272 |
- |
Veza Product Updates – March 2024 |
Dr. Maohua Lu |
Apr. 19, 2024 |
903 |
- |
The Imperative for Identity Security: A Call to Action for the Industry |
Mike Towers |
Apr. 24, 2024 |
1043 |
- |
Identity Security Spotlight: Ransomware attack on Ascension |
Veza |
May. 17, 2024 |
59 |
- |
The Veza Voice – Q1 2025 |
Mike Torres |
May. 17, 2024 |
2009 |
- |
What is IGA (Identity Governance & Administration)? |
Veza |
May. 23, 2024 |
2286 |
- |
Announcing The State of Access 2024 |
Tarun Thakur |
May. 22, 2024 |
421 |
- |
Harnessing the Power of AI: Identity Security as a Key Enabler |
Mike Towers |
May. 23, 2024 |
867 |
- |
AWS Guide: Access Governance, Security, Compliance & Roles [2024] |
Veza |
Jun. 05, 2024 |
2990 |
- |
Achieving, Demonstrating, and Maintaining PCI DSS Compliance with Veza: A Game-Changer for Financial Services Companies |
Mike Towers |
Jun. 06, 2024 |
751 |
- |
What is Machine Identity Management? [2024 Guide] |
Veza |
Jun. 07, 2024 |
2838 |
- |
Can you tell who has access to what in Snowflake? |
Kale Bogdanovs |
Jun. 18, 2024 |
2050 |
- |
Veza Product Updates – April 2024 |
Dr. Maohua Lu |
Jun. 20, 2024 |
1708 |
- |
The Critical Role of Identity Security in Enabling Zero Trust |
Mike Towers |
Jul. 01, 2024 |
559 |
- |
Authentication vs Authorization |
Veza |
Jul. 02, 2024 |
2088 |
- |
The Principle of Least Privilege Explained |
Kale Bogdanovs |
Aug. 03, 2023 |
3020 |
- |
Role mining for Snowflake: four steps toward least privilege |
Santosh Kumar |
Jul. 02, 2024 |
1706 |
- |
Veza Product Updates – May 2024 |
Dr. Maohua Lu |
Jul. 08, 2024 |
1422 |
- |
Intelligent Access for custom apps: getting started with Veza’s Open Authorization API |
Zee Khoo |
Jul. 11, 2024 |
2160 |
- |
What is SaaS Sprawl? |
Veza |
Jul. 11, 2024 |
2189 |
- |
Mitigating the UNC3944 Threat: The Power of Modern Identity Security Platforms |
Mike Towers |
Jul. 18, 2024 |
491 |
- |
Join us at Black Hat USA August 3 – 8, 2024 |
Veza |
Jul. 17, 2024 |
177 |
- |
The MIGHT of Veza |
Amy Veater |
Jul. 22, 2024 |
593 |
- |
Veza Product Updates – June 2024 |
Dr. Maohua Lu |
Jul. 24, 2024 |
1281 |
- |
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security |
Rich Dandliker |
Jul. 30, 2024 |
965 |
- |
Empowering Business Initiatives with Modern Identity Security |
Mike Towers |
Aug. 02, 2024 |
1244 |
- |
AI for Identity Security: My Journey, Our Perspective, and Veza’s Strategy |
Rich Dandliker |
Aug. 06, 2024 |
1278 |
- |
Introducing Access AI: The Future of Identity Security |
Jared Blistein |
Aug. 06, 2024 |
631 |
- |
Veza Product Updates – July 2024 |
Dr. Maohua Lu |
Aug. 19, 2024 |
1477 |
- |
Securing Snowflake: A CISO’s Guide to Effective Access Control |
Mike Towers |
Aug. 22, 2024 |
1283 |
- |
Identity Radicals: Identity governance in the cloud era |
Veza |
Aug. 26, 2024 |
1167 |
- |
IBM’s 2024 Cost of a Data Breach Report: AI-Powered Security Lowers Costs |
Jared Blistein |
Aug. 28, 2024 |
1652 |
- |
Combating Toxic Combinations Through Separation of Duties (SoD) Controls |
Jared Blistein |
Aug. 29, 2024 |
1365 |
- |
Cybersecurity’s biggest challenge: The Principle of Least Privilege |
Kale Bogdanovs |
Jul. 03, 2023 |
3074 |
- |
Veza’s Automated Access Revocation and Access Remediation |
Tom Smith |
Sep. 10, 2024 |
1000 |
- |
Veza Product Updates – August 2024 |
Dr. Maohua Lu |
Sep. 12, 2024 |
1153 |
- |
Charting a Path for the Future of Identity Security |
Mike Towers |
Sep. 23, 2024 |
1331 |
- |
Identity Security Spotlight: Microsoft CISA Investigation |
Veza |
Apr. 16, 2024 |
87 |
- |
Risk scoring in Identity Security |
Santosh Kumar |
Oct. 10, 2024 |
1517 |
- |
Simplifying Security: The Power of Effective Access Control in Cybersecurity |
Mike Towers |
Oct. 18, 2024 |
1005 |
- |
Veza Product Updates – September 2024 |
Dr. Maohua Lu |
Oct. 21, 2024 |
1800 |
- |
Going Beyond Provisioning and Deprovisioning with Veza Lifecycle Management |
Sandler Rubin |
Oct. 22, 2024 |
1465 |
- |
Non-Human Identity Security: A Practical Guide to Mitigating Risk |
Jared Blistein |
Oct. 29, 2024 |
1776 |
- |
Operationalizing Modern Identity Security: A CISO’s Perspective on Value Creation and Sustainable Growth |
Mike Towers |
Nov. 11, 2024 |
1187 |
- |
SOC 2 Compliance Requirements [2025] |
Veza |
Nov. 08, 2024 |
3593 |
- |
Identity Radicals: Groundhog day in identity security |
Veza |
Nov. 21, 2024 |
687 |
- |
What is lifecycle management in identity security? |
Veza |
Nov. 08, 2024 |
1925 |
- |
IBM Cost of a Data Breach Report: AI Security Cost Reduction | Veza |
Jared Blistein |
Aug. 28, 2024 |
1652 |
- |
Veza Product Updates – October 2024 |
Dr. Maohua Lu |
Nov. 22, 2024 |
1547 |
- |
Acess AI: Introducting the Future of Identity Security | Veza |
Jared Blistein |
Aug. 06, 2024 |
631 |
- |
Separation of Duties: Combating Toxic Combinations with SoD Controls | Veza |
Jared Blistein |
Aug. 29, 2024 |
1365 |
- |
12 Top IGA Software Vendors [2025 Guide] |
Veza |
Nov. 08, 2024 |
3712 |
- |
SOX Compliance Checklist: Your Sarbanes-Oxley Guide for 2025 |
Veza |
Dec. 02, 2024 |
3188 |
- |
Introducing Veza Access Requests: Automated, Policy-Driven Access at Scale |
Jared Blistein |
Dec. 03, 2024 |
954 |
- |
Posture of Access, 3 Pillars of Least Privilege | Ep 6, Identity Radicals Podcast with Adam Fletcher |
Veza |
Dec. 10, 2024 |
162 |
- |
Demonstrating PCI DSS 4.0 Compliance with Veza’s Identity Security Platform |
Mike Towers |
Dec. 12, 2024 |
1892 |
- |