Veza

Founded in 2020. Privately Held.

External links: homepage | blog | jobs | youtube | twitter | linkedin

Authorization platform for data.

Blog posts published by month since the start of

156 total blog posts published.

Switch to word count

Blog content

post title author published words HN
Employee Spotlight: Teju Shyamsundar, Head of Product Marketing Josh Ashton Oct. 10, 2022 1031 -
Employee Spotlight: Bobby Jackson, Regional Sales Director Josh Ashton Sep. 22, 2022 489 -
Veza Has Passed a New Milestone as it Modernizes Identity Security Jason Garoutte Jun. 22, 2023 1602 -
Three key lessons from last week's Okta breach Kale Bogdanovs Oct. 27, 2023 950 -
A Practitioner’s Guide to Intelligent Access Tarun Thakur Dec. 20, 2023 876 -
Why I’m excited about the future of Veza Niels Provos May. 03, 2022 808 -
Join Us at Oktane: Explore “Bad Permissions” and Veza’s Access Solutions Veza Sep. 20, 2023 225 -
Identity Security Spotlight: Delinea acquires Fastpath Veza Feb. 26, 2024 337 -
Identity Security Spotlight: Cisco announces “Identity Intelligence” Veza Feb. 08, 2024 41 -
Lessons from the breach: Microsoft and Midnight Blizzard Veza Feb. 21, 2024 341 -
Cybersecurity Theater: The Show Must (Not) Go On Teju Shyamsundar Oct. 19, 2022 1138 -
Identity Security Spotlight: Midnight Blizzard’s breach of Microsoft Veza Feb. 07, 2024 340 -
Snowflake security: how to manage entitlement creep Kale Bogdanovs Feb. 28, 2023 1659 -
Veza @ Snowflake Summit – June 26-29 Regina Soller-Gould Jun. 23, 2023 107 -
Three tips for collaborating safely in Slack Kale Bogdanovs Feb. 22, 2023 1326 -
5 Actionable Strategies to Improve Security Posture Eugene Feldman Dec. 01, 2023 438 -
Six takeaways from the Gartner IT Symposium 2023 Jason Garoutte Oct. 27, 2023 2019 -
The Veza Voice – December Issue Kale Bogdanovs Dec. 15, 2022 948 -
Beyond IAM: Zero Trust Needs A Second Act in Identity Rich Dandliker Mar. 20, 2023 1330 -
Can you make sense of permissions in AWS? Kale Bogdanovs Nov. 17, 2023 996 -
RBAC vs ABAC: Access Control Explained Kale Bogdanovs Aug. 15, 2022 1697 -
Authorization: The Missing Piece of Cloud Security Teju Shyamsundar Apr. 07, 2022 1357 -
Why Veza, Why Now? Tarun Thakur Oct. 10, 2023 1321 -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence Tarun Thakur Jul. 21, 2023 644 -
Veza @ AWS re:Invent Regina Soller-Gould Nov. 06, 2023 195 -
Three key lessons from unauthorized access to Okta’s support system Kale Bogdanovs Oct. 27, 2023 906 -
The Principle of Least Privilege Explained Kale Bogdanovs May. 25, 2023 3042 -
What is Access Governance? A 2024 overview Jared Blistein Feb. 23, 2024 2220 -
How to leverage Intelligent Access to de-risk the breach Rich Dandliker Jan. 02, 2024 776 -
The Fundamentals of a Data-Centric Approach to Cloud Security Teju Shyamsundar Jun. 07, 2022 1425 -
The Veza Voice – February issue Mike Bartholomy Mar. 01, 2023 1229 -
The Veza Voice – May Issue Dr. Maohua Lu May. 31, 2023 966 -
Understanding and protecting against the rising threat of Whale Phishing Ellen Falltrick Feb. 27, 2023 1884 -
What Least Privilege Means in Practice Teju Shyamsundar Apr. 25, 2022 1111 -
Digital Transformation and the Data Authorization Imperative Yousuf Khan May. 05, 2022 892 -
How to secure access to your source code in GitHub Rich Dandliker Mar. 01, 2023 1294 -
Data Security: The Challenge of Securing Service Accounts AK Khan May. 04, 2022 1104 -
Veza @ Fal.Con 2023 Regina Soller-Gould Sep. 11, 2023 152 -
The year of Intelligent Access Tarun Thakur Dec. 20, 2023 1402 -
A field guide to bad permissions, part 3: excessive permissions Kale Bogdanovs Dec. 16, 2023 1243 -
History of Hacks: SSRF attacks on AWS Ellen Falltrick May. 31, 2023 85 -
Veza at RSA Regina Soller-Gould Apr. 05, 2023 188 -
Into the VezaVerse: SaaS access security & governance Kale Bogdanovs May. 25, 2023 201 -
The Next Wave of Implementing Zero Trust: Moving from Authentication to Authorization Rich Dandliker May. 31, 2022 1723 -
The hard thing about Zero Trust Jason Garoutte Mar. 20, 2023 546 -
Authorization – The New Age of Cloud Identity Cody Sanford May. 11, 2022 911 -
Five ways to stop ransomware attacks Kale Bogdanovs May. 19, 2023 2167 -
Welcome, Phil Venables, to the Veza Board of Directors! Tarun Thakur Jul. 19, 2023 986 -
Veza Welcomes Gertie the Goat to Board of Advisors Veza Apr. 01, 2023 499 -
A field guide to bad permissions, part 1: ungoverned permissions Kale Bogdanovs Nov. 21, 2023 1219 -
Security Predictions for 2023 and Beyond Tarun Thakur Jan. 06, 2023 682 -
A field guide to bad permissions part 4: policy-violating permissions Kale Bogdanovs Dec. 21, 2023 1026 -
Identity Targeting: A Growing Threat with Rachel Wilson | Ep 1 Veza Oct. 05, 2023 378 -
Disrupting Breaches and Advancing InfoSec with David Tyburski | Ep 2 Veza Oct. 20, 2023 389 -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence Tarun Thakur Jan. 31, 2024 644 -
Integrate custom applications into a single control plane for authorization, with Open Authorization API Jim Lester Jan. 09, 2023 1267 -
AWS Verified Permissions release points towards the “Beyond IAM” era Kale Bogdanovs Jun. 23, 2023 986 -
Veza @ Gartner Symposium — October 15-19 Regina Soller-Gould Oct. 25, 2023 219 -
Why I Put My Hoof Down & Joined Veza Gertie the Goat Mar. 20, 2023 907 -
User Access Reviews: How They Work & Best Practices Alisa Ho Feb. 16, 2024 2516 -
What is identity security and why is it so complicated? Eugene Feldman Dec. 08, 2023 1125 -
A field guide to bad permissions part 2: expired permissions Kale Bogdanovs Nov. 30, 2023 1219 -
Veza Product Update – April 2023 Dr. Maohua Lu May. 12, 2023 758 -
The Five Tenets of Next-Gen IGA Jason Garoutte Nov. 20, 2023 2312 -
The Veza Voice – January Issue Mike Bartholomy Jan. 30, 2023 722 -
Rethinking Data Security with Veza Craig Rosen May. 05, 2022 941 -
Ransomware supply chain threats: What made a global automotive company shut their plants this past spring? Teju Shyamsundar Oct. 07, 2022 1048 -
Welcome to the Identity Radicals Podcast Veza Sep. 27, 2023 196 -
Solving the Long-Tail Integration Problem with an Open Platform Strategy: Meet the Open Authorization API (OAA) Rich Dandliker Apr. 26, 2022 1365 -
Identiverse 2022 – where are we after a rapid move to cloud data? Teju Shyamsundar Jul. 07, 2022 840 -
Authorization, NOT Authentication: the critical backbone for zero-trust security Tarek Khaled May. 10, 2022 1511 -
Snowflake security: how to manage and secure data access at scale Kale Bogdanovs Feb. 21, 2023 1268 -
History of Hacks: Outmaneuvering MFA Ellen Falltrick Jun. 07, 2023 98 -
The Age of Identity Security is here: Microsoft goes all-in on identity with Microsoft Entra Brian Schwarz Jul. 28, 2023 644 -
Veza Product Update – June 2023 Dr. Maohua Lu Jul. 26, 2023 900 -
The Basics of AWS IAM – Keeping Cloud Expansion Secure with Identity and Access Management for AWS Kale Bogdanovs Apr. 22, 2022 1679 -
Find and eliminate direct assignment of apps in your identity platform. Kale Bogdanovs Mar. 10, 2023 111 -
Why it’s Important to Understand Effective Permissions David “Wick” Sedgwick Apr. 25, 2022 1413 -
Security’s Next Frontier – Modernizing Data Security through Authorization for a Cloud-First Future Rich Dandliker Apr. 22, 2022 1047 -
Into the VezaVerse: Veza for Slack Kale Bogdanovs Jan. 31, 2023 136 -
Identity-Security Trends: Expectations vs Reality in Securing Data Teju Shyamsundar Jul. 26, 2022 845 -
Veza at Gartner IAM Regina Soller-Gould Mar. 20, 2023 257 -
5 Keys To Securing Your Data in a Multi-Cloud Environment Teju Shyamsundar Jun. 14, 2022 1068 -
History of Hacks: Orphaned Accounts Ellen Falltrick Aug. 01, 2023 98 -
The Veza Voice – March Issue Mike Bartholomy Apr. 11, 2023 1053 -
BlackHat USA 2022 Recap – 25 years of InfoSec Teju Shyamsundar Sep. 14, 2022 556 -
The Identity Authorization Approach to SaaS Access Governance Ellen Falltrick May. 03, 2023 1718 -
How strong is your SaaS Security Posture Management (SSPM)? Ellen Falltrick Apr. 12, 2023 2410 -
Decoding Data Sovereignty with Jenner Holden | Ep 3 Veza Nov. 02, 2023 430 -
Veza’s Founding Principles Kale Bogdanovs Apr. 06, 2022 737 -
Introducing Veza — Our Quest to Advance the Data Security Industry for Decades to Come Tarun Thakur Apr. 27, 2022 1361 -
Product updates: 2H Release Summary Dr. Maohua Lu Jan. 05, 2024 1001 -
Veza Secures Strategic Investment from Capital One Ventures and ServiceNow Ventures to Accelerate Identity Security Tarun Thakur Aug. 10, 2023 983 -
The Limits of “Man-in-the-Middle” Architecture for Authorization Rich Dandliker Jan. 25, 2023 625 -
Building Veza’s Platform and Products Tarun Thakur Aug. 15, 2023 996 -
Veza @ AWS re:Inforce June 13-14 Regina Soller-Gould Jun. 07, 2023 152 -
What is data security? Teju Shyamsundar May. 24, 2022 1220 -
Defend Against Ransomware with Authorization Monica Armand Nov. 03, 2022 658 -
Salesforce security, roles, privileged access management, and more Veza Mar. 08, 2022 1985 -
Join us at RSAC May 6-9, 2024 Veza Mar. 13, 2024 154 -
GitHub Access Control, Access Management, Security, Roles, Authorization & More Veza Mar. 15, 2024 1811 -
Veza welcomes Mike Towers as Chief Security & Trust Officer Veza Mar. 15, 2024 70 -
Veza for Zscaler: Bringing least privilege to ZIA Veza Mar. 22, 2024 342 -
Invisible keyholders: the importance of Non-Human Identity Management Mike Towers Mar. 22, 2024 780 -
What is Identity Security? Veza Mar. 29, 2024 2303 -
Key Takeaways: FBI Breach Prevention Tips Veza Apr. 10, 2024 918 -
Veza for HashiCorp Vault: Bringing least privilege to Vault and Secrets Tarun Thakur Apr. 12, 2024 386 -
Veza for Crowdstrike: Identify, triage and remediate in minutes Tarun Thakur Apr. 12, 2024 217 -
Complete Snowflake Review: Roles, Security & Access Control Veza Apr. 12, 2024 1971 -
Veza Product Updates – February 2024 Dr. Maohua Lu Apr. 15, 2024 689 -
Identity Security Posture Management Tarun Thakur Apr. 18, 2024 598 -
What is non-human identity management Veza Apr. 19, 2024 2272 -
Veza Product Updates – March 2024 Dr. Maohua Lu Apr. 19, 2024 903 -
The Imperative for Identity Security: A Call to Action for the Industry Mike Towers Apr. 24, 2024 1043 -
Identity Security Spotlight: Ransomware attack on Ascension Veza May. 17, 2024 59 -
The Veza Voice – Q1 2025 Mike Torres May. 17, 2024 2009 -
What is IGA (Identity Governance & Administration)? Veza May. 23, 2024 2286 -
Announcing The State of Access 2024 Tarun Thakur May. 22, 2024 421 -
Harnessing the Power of AI: Identity Security as a Key Enabler Mike Towers May. 23, 2024 867 -
AWS Guide: Access Governance, Security, Compliance & Roles [2024] Veza Jun. 05, 2024 2990 -
Achieving, Demonstrating, and Maintaining PCI DSS Compliance with Veza: A Game-Changer for Financial Services Companies Mike Towers Jun. 06, 2024 751 -
What is Machine Identity Management? [2024 Guide] Veza Jun. 07, 2024 2838 -
Can you tell who has access to what in Snowflake? Kale Bogdanovs Jun. 18, 2024 2050 -
Veza Product Updates – April 2024 Dr. Maohua Lu Jun. 20, 2024 1708 -
The Critical Role of Identity Security in Enabling Zero Trust Mike Towers Jul. 01, 2024 559 -
Authentication vs Authorization Veza Jul. 02, 2024 2088 -
The Principle of Least Privilege Explained Kale Bogdanovs Aug. 03, 2023 3020 -
Role mining for Snowflake: four steps toward least privilege Santosh Kumar Jul. 02, 2024 1706 -
Veza Product Updates – May 2024 Dr. Maohua Lu Jul. 08, 2024 1422 -
Intelligent Access for custom apps: getting started with Veza’s Open Authorization API Zee Khoo Jul. 11, 2024 2160 -
What is SaaS Sprawl? Veza Jul. 11, 2024 2189 -
Mitigating the UNC3944 Threat: The Power of Modern Identity Security Platforms Mike Towers Jul. 18, 2024 491 -
Join us at Black Hat USA August 3 – 8, 2024 Veza Jul. 17, 2024 177 -
The MIGHT of Veza Amy Veater Jul. 22, 2024 593 -
Veza Product Updates – June 2024 Dr. Maohua Lu Jul. 24, 2024 1281 -
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security Rich Dandliker Jul. 30, 2024 965 -
Empowering Business Initiatives with Modern Identity Security Mike Towers Aug. 02, 2024 1244 -
AI for Identity Security: My Journey, Our Perspective, and Veza’s Strategy Rich Dandliker Aug. 06, 2024 1278 -
Introducing Access AI: The Future of Identity Security Jared Blistein Aug. 06, 2024 631 -
Veza Product Updates – July 2024 Dr. Maohua Lu Aug. 19, 2024 1477 -
Securing Snowflake: A CISO’s Guide to Effective Access Control Mike Towers Aug. 22, 2024 1283 -
Identity Radicals: Identity governance in the cloud era Veza Aug. 26, 2024 1167 -
IBM’s 2024 Cost of a Data Breach Report: AI-Powered Security Lowers Costs Jared Blistein Aug. 28, 2024 1652 -
Combating Toxic Combinations Through Separation of Duties (SoD) Controls Jared Blistein Aug. 29, 2024 1365 -
Cybersecurity’s biggest challenge: The Principle of Least Privilege Kale Bogdanovs Jul. 03, 2023 3074 -
Veza’s Automated Access Revocation and Access Remediation Tom Smith Sep. 10, 2024 1000 -
Veza Product Updates – August 2024 Dr. Maohua Lu Sep. 12, 2024 1153 -
Charting a Path for the Future of Identity Security Mike Towers Sep. 23, 2024 1331 -
Identity Security Spotlight: Microsoft CISA Investigation Veza Apr. 16, 2024 87 -
Risk scoring in Identity Security Santosh Kumar Oct. 10, 2024 1517 -
Simplifying Security: The Power of Effective Access Control in Cybersecurity Mike Towers Oct. 18, 2024 1005 -
Veza Product Updates – September 2024 Dr. Maohua Lu Oct. 21, 2024 1800 -
Going Beyond Provisioning and Deprovisioning with Veza Lifecycle Management Sandler Rubin Oct. 22, 2024 1465 -
Non-Human Identity Security: A Practical Guide to Mitigating Risk Jared Blistein Oct. 29, 2024 1776 -
Operationalizing Modern Identity Security: A CISO’s Perspective on Value Creation and Sustainable Growth Mike Towers Nov. 11, 2024 1187 -
SOC 2 Compliance Requirements [2025] Veza Nov. 08, 2024 3593 -

By Matt Makai. 2021-2024.