167 blog posts published by month since the start of 2021. Start from a different year:

Blog URL
Posts year-to-date
0 (3 posts by this month last year.)
Average posts per month since 2021
2.8

Post details (2021 to today)

Title Author Date Word count HN points
Employee Spotlight: Teju Shyamsundar, Head of Product Marketing Josh Ashton Oct 10, 2022 1031 -
Employee Spotlight: Bobby Jackson, Regional Sales Director Josh Ashton Sep 22, 2022 489 -
Veza Has Passed a New Milestone as it Modernizes Identity Security Jason Garoutte Jun 22, 2023 1602 -
Three key lessons from last week's Okta breach Kale Bogdanovs Oct 27, 2023 950 -
A Practitioner’s Guide to Intelligent Access Tarun Thakur Dec 20, 2023 876 -
Why I’m excited about the future of Veza Niels Provos May 03, 2022 808 -
Join Us at Oktane: Explore “Bad Permissions” and Veza’s Access Solutions Veza Sep 20, 2023 225 -
Identity Security Spotlight: Delinea acquires Fastpath Veza Feb 26, 2024 337 -
Identity Security Spotlight: Cisco announces “Identity Intelligence” Veza Feb 08, 2024 41 -
Lessons from the breach: Microsoft and Midnight Blizzard Veza Feb 21, 2024 341 -
Cybersecurity Theater: The Show Must (Not) Go On Teju Shyamsundar Oct 19, 2022 1138 -
Identity Security Spotlight: Midnight Blizzard’s breach of Microsoft Veza Feb 07, 2024 340 -
Snowflake security: how to manage entitlement creep Kale Bogdanovs Feb 28, 2023 1659 -
Veza @ Snowflake Summit – June 26-29 Regina Soller-Gould Jun 23, 2023 107 -
Three tips for collaborating safely in Slack Kale Bogdanovs Feb 22, 2023 1326 -
5 Actionable Strategies to Improve Security Posture Eugene Feldman Dec 01, 2023 438 -
Six takeaways from the Gartner IT Symposium 2023 Jason Garoutte Oct 27, 2023 2019 -
The Veza Voice – December Issue Kale Bogdanovs Dec 15, 2022 948 -
Beyond IAM: Zero Trust Needs A Second Act in Identity Rich Dandliker Mar 20, 2023 1330 -
Can you make sense of permissions in AWS? Kale Bogdanovs Nov 17, 2023 996 -
RBAC vs ABAC: Access Control Explained Kale Bogdanovs Aug 15, 2022 1697 -
Authorization: The Missing Piece of Cloud Security Teju Shyamsundar Apr 07, 2022 1357 -
Why Veza, Why Now? Tarun Thakur Oct 10, 2023 1321 -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence Tarun Thakur Jul 21, 2023 644 -
Veza @ AWS re:Invent Regina Soller-Gould Nov 06, 2023 195 -
Three key lessons from unauthorized access to Okta’s support system Kale Bogdanovs Oct 27, 2023 906 -
The Principle of Least Privilege Explained Kale Bogdanovs May 25, 2023 3042 -
What is Access Governance? A 2024 overview Jared Blistein Feb 23, 2024 2220 -
How to leverage Intelligent Access to de-risk the breach Rich Dandliker Jan 02, 2024 776 -
The Fundamentals of a Data-Centric Approach to Cloud Security Teju Shyamsundar Jun 07, 2022 1425 -
The Veza Voice – February issue Mike Bartholomy Mar 01, 2023 1229 -
The Veza Voice – May Issue Dr. Maohua Lu May 31, 2023 966 -
Understanding and protecting against the rising threat of Whale Phishing Ellen Falltrick Feb 27, 2023 1884 -
What Least Privilege Means in Practice Teju Shyamsundar Apr 25, 2022 1111 -
Digital Transformation and the Data Authorization Imperative Yousuf Khan May 05, 2022 892 -
How to secure access to your source code in GitHub Rich Dandliker Mar 01, 2023 1294 -
Data Security: The Challenge of Securing Service Accounts AK Khan May 04, 2022 1104 -
Veza @ Fal.Con 2023 Regina Soller-Gould Sep 11, 2023 152 -
The year of Intelligent Access Tarun Thakur Dec 20, 2023 1402 -
A field guide to bad permissions, part 3: excessive permissions Kale Bogdanovs Dec 16, 2023 1243 -
History of Hacks: SSRF attacks on AWS Ellen Falltrick May 31, 2023 85 -
Veza at RSA Regina Soller-Gould Apr 05, 2023 188 -
Into the VezaVerse: SaaS access security & governance Kale Bogdanovs May 25, 2023 201 -
The Next Wave of Implementing Zero Trust: Moving from Authentication to Authorization Rich Dandliker May 31, 2022 1723 -
The hard thing about Zero Trust Jason Garoutte Mar 20, 2023 546 -
Authorization – The New Age of Cloud Identity Cody Sanford May 11, 2022 911 -
Five ways to stop ransomware attacks Kale Bogdanovs May 19, 2023 2167 -
Welcome, Phil Venables, to the Veza Board of Directors! Tarun Thakur Jul 19, 2023 986 -
Veza Welcomes Gertie the Goat to Board of Advisors Veza Apr 01, 2023 499 -
A field guide to bad permissions, part 1: ungoverned permissions Kale Bogdanovs Nov 21, 2023 1219 -
Security Predictions for 2023 and Beyond Tarun Thakur Jan 06, 2023 682 -
A field guide to bad permissions part 4: policy-violating permissions Kale Bogdanovs Dec 21, 2023 1026 -
Identity Targeting: A Growing Threat with Rachel Wilson | Ep 1 Veza Oct 05, 2023 378 -
Disrupting Breaches and Advancing InfoSec with David Tyburski | Ep 2 Veza Oct 20, 2023 389 -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence Tarun Thakur Jan 31, 2024 644 -
Integrate custom applications into a single control plane for authorization, with Open Authorization API Jim Lester Jan 09, 2023 1267 -
AWS Verified Permissions release points towards the “Beyond IAM” era Kale Bogdanovs Jun 23, 2023 986 -
Veza @ Gartner Symposium — October 15-19 Regina Soller-Gould Oct 25, 2023 219 -
Why I Put My Hoof Down & Joined Veza Gertie the Goat Mar 20, 2023 907 -
User Access Reviews: How They Work & Best Practices Alisa Ho Feb 16, 2024 2516 -
What is identity security and why is it so complicated? Eugene Feldman Dec 08, 2023 1125 -
A field guide to bad permissions part 2: expired permissions Kale Bogdanovs Nov 30, 2023 1219 -
Veza Product Update – April 2023 Dr. Maohua Lu May 12, 2023 758 -
The Five Tenets of Next-Gen IGA Jason Garoutte Nov 20, 2023 2312 -
The Veza Voice – January Issue Mike Bartholomy Jan 30, 2023 722 -
Rethinking Data Security with Veza Craig Rosen May 05, 2022 941 -
Ransomware supply chain threats: What made a global automotive company shut their plants this past spring? Teju Shyamsundar Oct 07, 2022 1048 -
Welcome to the Identity Radicals Podcast Veza Sep 27, 2023 196 -
Solving the Long-Tail Integration Problem with an Open Platform Strategy: Meet the Open Authorization API (OAA) Rich Dandliker Apr 26, 2022 1365 -
Identiverse 2022 – where are we after a rapid move to cloud data? Teju Shyamsundar Jul 07, 2022 840 -
Authorization, NOT Authentication: the critical backbone for zero-trust security Tarek Khaled May 10, 2022 1511 -
Snowflake security: how to manage and secure data access at scale Kale Bogdanovs Feb 21, 2023 1268 -
History of Hacks: Outmaneuvering MFA Ellen Falltrick Jun 07, 2023 98 -
The Age of Identity Security is here: Microsoft goes all-in on identity with Microsoft Entra Brian Schwarz Jul 28, 2023 644 -
Veza Product Update – June 2023 Dr. Maohua Lu Jul 26, 2023 900 -
The Basics of AWS IAM – Keeping Cloud Expansion Secure with Identity and Access Management for AWS Kale Bogdanovs Apr 22, 2022 1679 -
Find and eliminate direct assignment of apps in your identity platform. Kale Bogdanovs Mar 10, 2023 111 -
Why it’s Important to Understand Effective Permissions David “Wick” Sedgwick Apr 25, 2022 1413 -
Security’s Next Frontier – Modernizing Data Security through Authorization for a Cloud-First Future Rich Dandliker Apr 22, 2022 1047 -
Into the VezaVerse: Veza for Slack Kale Bogdanovs Jan 31, 2023 136 -
Identity-Security Trends: Expectations vs Reality in Securing Data Teju Shyamsundar Jul 26, 2022 845 -
Veza at Gartner IAM Regina Soller-Gould Mar 20, 2023 257 -
5 Keys To Securing Your Data in a Multi-Cloud Environment Teju Shyamsundar Jun 14, 2022 1068 -
History of Hacks: Orphaned Accounts Ellen Falltrick Aug 01, 2023 98 -
The Veza Voice – March Issue Mike Bartholomy Apr 11, 2023 1053 -
BlackHat USA 2022 Recap – 25 years of InfoSec Teju Shyamsundar Sep 14, 2022 556 -
The Identity Authorization Approach to SaaS Access Governance Ellen Falltrick May 03, 2023 1718 -
How strong is your SaaS Security Posture Management (SSPM)? Ellen Falltrick Apr 12, 2023 2410 -
Decoding Data Sovereignty with Jenner Holden | Ep 3 Veza Nov 02, 2023 430 -
Veza’s Founding Principles Kale Bogdanovs Apr 06, 2022 737 -
Introducing Veza — Our Quest to Advance the Data Security Industry for Decades to Come Tarun Thakur Apr 27, 2022 1361 -
Product updates: 2H Release Summary Dr. Maohua Lu Jan 05, 2024 1001 -
Veza Secures Strategic Investment from Capital One Ventures and ServiceNow Ventures to Accelerate Identity Security Tarun Thakur Aug 10, 2023 983 -
The Limits of “Man-in-the-Middle” Architecture for Authorization Rich Dandliker Jan 25, 2023 625 -
Building Veza’s Platform and Products Tarun Thakur Aug 15, 2023 996 -
Veza @ AWS re:Inforce June 13-14 Regina Soller-Gould Jun 07, 2023 152 -
What is data security? Teju Shyamsundar May 24, 2022 1220 -
Defend Against Ransomware with Authorization Monica Armand Nov 03, 2022 658 -
Salesforce security, roles, privileged access management, and more Veza Mar 08, 2022 1985 -
Join us at RSAC May 6-9, 2024 Veza Mar 13, 2024 154 -
GitHub Access Control, Access Management, Security, Roles, Authorization & More Veza Mar 15, 2024 1811 -
Veza welcomes Mike Towers as Chief Security & Trust Officer Veza Mar 15, 2024 70 -
Veza for Zscaler: Bringing least privilege to ZIA Veza Mar 22, 2024 342 -
Invisible keyholders: the importance of Non-Human Identity Management Mike Towers Mar 22, 2024 780 -
What is Identity Security? Veza Mar 29, 2024 2303 -
Key Takeaways: FBI Breach Prevention Tips Veza Apr 10, 2024 918 -
Veza for HashiCorp Vault: Bringing least privilege to Vault and Secrets Tarun Thakur Apr 12, 2024 386 -
Veza for Crowdstrike: Identify, triage and remediate in minutes Tarun Thakur Apr 12, 2024 217 -
Complete Snowflake Review: Roles, Security & Access Control Veza Apr 12, 2024 1971 -
Veza Product Updates – February 2024 Dr. Maohua Lu Apr 15, 2024 689 -
Identity Security Posture Management Tarun Thakur Apr 18, 2024 598 -
What is non-human identity management Veza Apr 19, 2024 2272 -
Veza Product Updates – March 2024 Dr. Maohua Lu Apr 19, 2024 903 -
The Imperative for Identity Security: A Call to Action for the Industry Mike Towers Apr 24, 2024 1043 -
Identity Security Spotlight: Ransomware attack on Ascension Veza May 17, 2024 59 -
The Veza Voice – Q1 2025 Mike Torres May 17, 2024 2009 -
What is IGA (Identity Governance & Administration)? Veza May 23, 2024 2286 -
Announcing The State of Access 2024 Tarun Thakur May 22, 2024 421 -
Harnessing the Power of AI: Identity Security as a Key Enabler Mike Towers May 23, 2024 867 -
AWS Guide: Access Governance, Security, Compliance & Roles [2024] Veza Jun 05, 2024 2990 -
Achieving, Demonstrating, and Maintaining PCI DSS Compliance with Veza: A Game-Changer for Financial Services Companies Mike Towers Jun 06, 2024 751 -
What is Machine Identity Management? [2024 Guide] Veza Jun 07, 2024 2838 -
Can you tell who has access to what in Snowflake? Kale Bogdanovs Jun 18, 2024 2050 -
Veza Product Updates – April 2024 Dr. Maohua Lu Jun 20, 2024 1708 -
The Critical Role of Identity Security in Enabling Zero Trust Mike Towers Jul 01, 2024 559 -
Authentication vs Authorization Veza Jul 02, 2024 2088 -
The Principle of Least Privilege Explained Kale Bogdanovs Aug 03, 2023 3020 -
Role mining for Snowflake: four steps toward least privilege Santosh Kumar Jul 02, 2024 1706 -
Veza Product Updates – May 2024 Dr. Maohua Lu Jul 08, 2024 1422 -
Intelligent Access for custom apps: getting started with Veza’s Open Authorization API Zee Khoo Jul 11, 2024 2160 -
What is SaaS Sprawl? Veza Jul 11, 2024 2189 -
Mitigating the UNC3944 Threat: The Power of Modern Identity Security Platforms Mike Towers Jul 18, 2024 491 -
Join us at Black Hat USA August 3 – 8, 2024 Veza Jul 17, 2024 177 -
The MIGHT of Veza Amy Veater Jul 22, 2024 593 -
Veza Product Updates – June 2024 Dr. Maohua Lu Jul 24, 2024 1281 -
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security Rich Dandliker Jul 30, 2024 965 -
Empowering Business Initiatives with Modern Identity Security Mike Towers Aug 02, 2024 1244 -
AI for Identity Security: My Journey, Our Perspective, and Veza’s Strategy Rich Dandliker Aug 06, 2024 1278 -
Introducing Access AI: The Future of Identity Security Jared Blistein Aug 06, 2024 631 -
Veza Product Updates – July 2024 Dr. Maohua Lu Aug 19, 2024 1477 -
Securing Snowflake: A CISO’s Guide to Effective Access Control Mike Towers Aug 22, 2024 1283 -
Identity Radicals: Identity governance in the cloud era Veza Aug 26, 2024 1167 -
IBM’s 2024 Cost of a Data Breach Report: AI-Powered Security Lowers Costs Jared Blistein Aug 28, 2024 1652 -
Combating Toxic Combinations Through Separation of Duties (SoD) Controls Jared Blistein Aug 29, 2024 1365 -
Cybersecurity’s biggest challenge: The Principle of Least Privilege Kale Bogdanovs Jul 03, 2023 3074 -
Veza’s Automated Access Revocation and Access Remediation Tom Smith Sep 10, 2024 1000 -
Veza Product Updates – August 2024 Dr. Maohua Lu Sep 12, 2024 1153 -
Charting a Path for the Future of Identity Security Mike Towers Sep 23, 2024 1331 -
Identity Security Spotlight: Microsoft CISA Investigation Veza Apr 16, 2024 87 -
Risk scoring in Identity Security Santosh Kumar Oct 10, 2024 1517 -
Simplifying Security: The Power of Effective Access Control in Cybersecurity Mike Towers Oct 18, 2024 1005 -
Veza Product Updates – September 2024 Dr. Maohua Lu Oct 21, 2024 1800 -
Going Beyond Provisioning and Deprovisioning with Veza Lifecycle Management Sandler Rubin Oct 22, 2024 1465 -
Non-Human Identity Security: A Practical Guide to Mitigating Risk Jared Blistein Oct 29, 2024 1776 -
Operationalizing Modern Identity Security: A CISO’s Perspective on Value Creation and Sustainable Growth Mike Towers Nov 11, 2024 1187 -
SOC 2 Compliance Requirements [2025] Veza Nov 08, 2024 3593 -
Identity Radicals: Groundhog day in identity security Veza Nov 21, 2024 687 -
What is lifecycle management in identity security? Veza Nov 08, 2024 1925 -
IBM Cost of a Data Breach Report: AI Security Cost Reduction | Veza Jared Blistein Aug 28, 2024 1652 -
Veza Product Updates – October 2024 Dr. Maohua Lu Nov 22, 2024 1547 -
Acess AI: Introducting the Future of Identity Security | Veza Jared Blistein Aug 06, 2024 631 -
Separation of Duties: Combating Toxic Combinations with SoD Controls | Veza Jared Blistein Aug 29, 2024 1365 -
12 Top IGA Software Vendors [2025 Guide] Veza Nov 08, 2024 3712 -
SOX Compliance Checklist: Your Sarbanes-Oxley Guide for 2025 Veza Dec 02, 2024 3188 -
Introducing Veza Access Requests: Automated, Policy-Driven Access at Scale Jared Blistein Dec 03, 2024 954 -
Posture of Access, 3 Pillars of Least Privilege | Ep 6, Identity Radicals Podcast with Adam Fletcher Veza Dec 10, 2024 162 -
Demonstrating PCI DSS 4.0 Compliance with Veza’s Identity Security Platform Mike Towers Dec 12, 2024 1892 -