162 blog posts published by month since the start of 2023. Start from a different year:

Blog URL
Posts year-to-date
16 (25 posts by this month last year.)
Average posts per month since 2023
4.5

Post details (2023 to today)

Title Author Date Word count HN points
Veza Has Passed a New Milestone as it Modernizes Identity Security Jason Garoutte Jun 22, 2023 1602 -
Three key lessons from last week's Okta breach Kale Bogdanovs Oct 27, 2023 950 -
A Practitioner’s Guide to Intelligent Access Tarun Thakur Dec 20, 2023 876 -
Join Us at Oktane: Explore “Bad Permissions” and Veza’s Access Solutions Veza Sep 20, 2023 225 -
Identity Security Spotlight: Delinea acquires Fastpath Veza Feb 26, 2024 337 -
Identity Security Spotlight: Cisco announces “Identity Intelligence” Veza Feb 08, 2024 41 -
Lessons from the breach: Microsoft and Midnight Blizzard Veza Feb 21, 2024 341 -
Identity Security Spotlight: Midnight Blizzard’s breach of Microsoft Veza Feb 07, 2024 340 -
Snowflake security: how to manage entitlement creep Kale Bogdanovs Feb 28, 2023 1659 -
Veza @ Snowflake Summit – June 26-29 Regina Soller-Gould Jun 23, 2023 107 -
Three tips for collaborating safely in Slack Kale Bogdanovs Feb 22, 2023 1326 -
5 Actionable Strategies to Improve Security Posture Eugene Feldman Dec 01, 2023 438 -
Six takeaways from the Gartner IT Symposium 2023 Jason Garoutte Oct 27, 2023 2019 -
Beyond IAM: Zero Trust Needs A Second Act in Identity Rich Dandliker Mar 20, 2023 1330 -
Can you make sense of permissions in AWS? Kale Bogdanovs Nov 17, 2023 996 -
Why Veza, Why Now? Tarun Thakur Oct 10, 2023 1321 -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence Tarun Thakur Jul 21, 2023 644 -
Veza @ AWS re:Invent Regina Soller-Gould Nov 06, 2023 195 -
Three key lessons from unauthorized access to Okta’s support system Kale Bogdanovs Oct 27, 2023 906 -
The Principle of Least Privilege Explained Kale Bogdanovs May 25, 2023 3042 -
What is Access Governance? A 2024 overview Jared Blistein Feb 23, 2024 2220 -
How to leverage Intelligent Access to de-risk the breach Rich Dandliker Jan 02, 2024 776 -
The Veza Voice – February issue Mike Bartholomy Mar 01, 2023 1229 -
The Veza Voice – May Issue Dr. Maohua Lu May 31, 2023 966 -
Understanding and protecting against the rising threat of Whale Phishing Ellen Falltrick Feb 27, 2023 1884 -
How to secure access to your source code in GitHub Rich Dandliker Mar 01, 2023 1294 -
Veza @ Fal.Con 2023 Regina Soller-Gould Sep 11, 2023 152 -
The year of Intelligent Access Tarun Thakur Dec 20, 2023 1402 -
A field guide to bad permissions, part 3: excessive permissions Kale Bogdanovs Dec 16, 2023 1243 -
History of Hacks: SSRF attacks on AWS Ellen Falltrick May 31, 2023 85 -
Veza at RSA Regina Soller-Gould Apr 05, 2023 188 -
Into the VezaVerse: SaaS access security & governance Kale Bogdanovs May 25, 2023 201 -
The hard thing about Zero Trust Jason Garoutte Mar 20, 2023 546 -
Five ways to stop ransomware attacks Kale Bogdanovs May 19, 2023 2167 -
Welcome, Phil Venables, to the Veza Board of Directors! Tarun Thakur Jul 19, 2023 986 -
Veza Welcomes Gertie the Goat to Board of Advisors Veza Apr 01, 2023 499 -
A field guide to bad permissions, part 1: ungoverned permissions Kale Bogdanovs Nov 21, 2023 1219 -
Security Predictions for 2023 and Beyond Tarun Thakur Jan 06, 2023 682 -
A field guide to bad permissions part 4: policy-violating permissions Kale Bogdanovs Dec 21, 2023 1026 -
Identity Targeting: A Growing Threat with Rachel Wilson | Ep 1 Veza Oct 05, 2023 378 -
Disrupting Breaches and Advancing InfoSec with David Tyburski | Ep 2 Veza Oct 20, 2023 389 -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence Tarun Thakur Jan 31, 2024 644 -
Integrate custom applications into a single control plane for authorization, with Open Authorization API Jim Lester Jan 09, 2023 1267 -
AWS Verified Permissions release points towards the “Beyond IAM” era Kale Bogdanovs Jun 23, 2023 986 -
Veza @ Gartner Symposium — October 15-19 Regina Soller-Gould Oct 25, 2023 219 -
Why I Put My Hoof Down & Joined Veza Gertie the Goat Mar 20, 2023 907 -
User Access Reviews: How They Work & Best Practices Alisa Ho Feb 16, 2024 2516 -
What is identity security and why is it so complicated? Eugene Feldman Dec 08, 2023 1125 -
A field guide to bad permissions part 2: expired permissions Kale Bogdanovs Nov 30, 2023 1219 -
Veza Product Update – April 2023 Dr. Maohua Lu May 12, 2023 758 -
The Five Tenets of Next-Gen IGA Jason Garoutte Nov 20, 2023 2312 -
The Veza Voice – January Issue Mike Bartholomy Jan 30, 2023 722 -
Welcome to the Identity Radicals Podcast Veza Sep 27, 2023 196 -
Snowflake security: how to manage and secure data access at scale Kale Bogdanovs Feb 21, 2023 1268 -
History of Hacks: Outmaneuvering MFA Ellen Falltrick Jun 07, 2023 98 -
The Age of Identity Security is here: Microsoft goes all-in on identity with Microsoft Entra Brian Schwarz Jul 28, 2023 644 -
Veza Product Update – June 2023 Dr. Maohua Lu Jul 26, 2023 900 -
Find and eliminate direct assignment of apps in your identity platform. Kale Bogdanovs Mar 10, 2023 111 -
Into the VezaVerse: Veza for Slack Kale Bogdanovs Jan 31, 2023 136 -
Veza at Gartner IAM Regina Soller-Gould Mar 20, 2023 257 -
History of Hacks: Orphaned Accounts Ellen Falltrick Aug 01, 2023 98 -
The Veza Voice – March Issue Mike Bartholomy Apr 11, 2023 1053 -
The Identity Authorization Approach to SaaS Access Governance Ellen Falltrick May 03, 2023 1718 -
How strong is your SaaS Security Posture Management (SSPM)? Ellen Falltrick Apr 12, 2023 2410 -
Decoding Data Sovereignty with Jenner Holden | Ep 3 Veza Nov 02, 2023 430 -
Product updates: 2H Release Summary Dr. Maohua Lu Jan 05, 2024 1001 -
Veza Secures Strategic Investment from Capital One Ventures and ServiceNow Ventures to Accelerate Identity Security Tarun Thakur Aug 10, 2023 983 -
The Limits of “Man-in-the-Middle” Architecture for Authorization Rich Dandliker Jan 25, 2023 625 -
Building Veza’s Platform and Products Tarun Thakur Aug 15, 2023 996 -
Veza @ AWS re:Inforce June 13-14 Regina Soller-Gould Jun 07, 2023 152 -
Join us at RSAC May 6-9, 2024 Veza Mar 13, 2024 154 -
GitHub Access Control, Access Management, Security, Roles, Authorization & More Veza Mar 15, 2024 1811 -
Veza welcomes Mike Towers as Chief Security & Trust Officer Veza Mar 15, 2024 70 -
Veza for Zscaler: Bringing least privilege to ZIA Veza Mar 22, 2024 342 -
Invisible keyholders: the importance of Non-Human Identity Management Mike Towers Mar 22, 2024 780 -
What is Identity Security? Veza Mar 29, 2024 2303 -
Key Takeaways: FBI Breach Prevention Tips Veza Apr 10, 2024 918 -
Veza for HashiCorp Vault: Bringing least privilege to Vault and Secrets Tarun Thakur Apr 12, 2024 386 -
Veza for Crowdstrike: Identify, triage and remediate in minutes Tarun Thakur Apr 12, 2024 217 -
Complete Snowflake Review: Roles, Security & Access Control Veza Apr 12, 2024 1971 -
Veza Product Updates – February 2024 Dr. Maohua Lu Apr 15, 2024 689 -
Identity Security Posture Management Tarun Thakur Apr 18, 2024 598 -
What is non-human identity management Veza Apr 19, 2024 2272 -
Veza Product Updates – March 2024 Dr. Maohua Lu Apr 19, 2024 903 -
The Imperative for Identity Security: A Call to Action for the Industry Mike Towers Apr 24, 2024 1043 -
Identity Security Spotlight: Ransomware attack on Ascension Veza May 17, 2024 59 -
The Veza Voice – Q1 2025 Mike Torres May 17, 2024 2009 -
What is IGA (Identity Governance & Administration)? Veza May 23, 2024 2286 -
Announcing The State of Access 2024 Tarun Thakur May 22, 2024 421 -
Harnessing the Power of AI: Identity Security as a Key Enabler Mike Towers May 23, 2024 867 -
AWS Guide: Access Governance, Security, Compliance & Roles [2024] Veza Jun 05, 2024 2990 -
Achieving, Demonstrating, and Maintaining PCI DSS Compliance with Veza: A Game-Changer for Financial Services Companies Mike Towers Jun 06, 2024 751 -
What is Machine Identity Management? [2024 Guide] Veza Jun 07, 2024 2838 -
Can you tell who has access to what in Snowflake? Kale Bogdanovs Jun 18, 2024 2050 -
Veza Product Updates – April 2024 Dr. Maohua Lu Jun 20, 2024 1708 -
The Critical Role of Identity Security in Enabling Zero Trust Mike Towers Jul 01, 2024 559 -
Authentication vs Authorization Veza Jul 02, 2024 2088 -
The Principle of Least Privilege Explained Kale Bogdanovs Aug 03, 2023 3020 -
Role mining for Snowflake: four steps toward least privilege Santosh Kumar Jul 02, 2024 1706 -
Veza Product Updates – May 2024 Dr. Maohua Lu Jul 08, 2024 1422 -
Intelligent Access for custom apps: getting started with Veza’s Open Authorization API Zee Khoo Jul 11, 2024 2160 -
What is SaaS Sprawl? Veza Jul 11, 2024 2189 -
Mitigating the UNC3944 Threat: The Power of Modern Identity Security Platforms Mike Towers Jul 18, 2024 491 -
Join us at Black Hat USA August 3 – 8, 2024 Veza Jul 17, 2024 177 -
The MIGHT of Veza Amy Veater Jul 22, 2024 593 -
Veza Product Updates – June 2024 Dr. Maohua Lu Jul 24, 2024 1281 -
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security Rich Dandliker Jul 30, 2024 965 -
Empowering Business Initiatives with Modern Identity Security Mike Towers Aug 02, 2024 1244 -
AI for Identity Security: My Journey, Our Perspective, and Veza’s Strategy Rich Dandliker Aug 06, 2024 1278 -
Introducing Access AI: The Future of Identity Security Jared Blistein Aug 06, 2024 631 -
Veza Product Updates – July 2024 Dr. Maohua Lu Aug 19, 2024 1477 -
Securing Snowflake: A CISO’s Guide to Effective Access Control Mike Towers Aug 22, 2024 1283 -
Identity Radicals: Identity governance in the cloud era Veza Aug 26, 2024 1167 -
IBM’s 2024 Cost of a Data Breach Report: AI-Powered Security Lowers Costs Jared Blistein Aug 28, 2024 1652 -
Combating Toxic Combinations Through Separation of Duties (SoD) Controls Jared Blistein Aug 29, 2024 1365 -
Cybersecurity’s biggest challenge: The Principle of Least Privilege Kale Bogdanovs Jul 03, 2023 3074 -
Veza’s Automated Access Revocation and Access Remediation Tom Smith Sep 10, 2024 1000 -
Veza Product Updates – August 2024 Dr. Maohua Lu Sep 12, 2024 1153 -
Charting a Path for the Future of Identity Security Mike Towers Sep 23, 2024 1331 -
Identity Security Spotlight: Microsoft CISA Investigation Veza Apr 16, 2024 87 -
Risk scoring in Identity Security Santosh Kumar Oct 10, 2024 1517 -
Simplifying Security: The Power of Effective Access Control in Cybersecurity Mike Towers Oct 18, 2024 1005 -
Veza Product Updates – September 2024 Dr. Maohua Lu Oct 21, 2024 1800 -
Going Beyond Provisioning and Deprovisioning with Veza Lifecycle Management Sandler Rubin Oct 22, 2024 1465 -
Non-Human Identity Security: A Practical Guide to Mitigating Risk Jared Blistein Oct 29, 2024 1776 -
Operationalizing Modern Identity Security: A CISO’s Perspective on Value Creation and Sustainable Growth Mike Towers Nov 11, 2024 1187 -
SOC 2 Compliance Requirements [2025] Veza Nov 08, 2024 3593 -
Identity Radicals: Groundhog day in identity security Veza Nov 21, 2024 687 -
What is lifecycle management in identity security? Veza Nov 08, 2024 1925 -
IBM Cost of a Data Breach Report: AI Security Cost Reduction | Veza Jared Blistein Aug 28, 2024 1652 -
Veza Product Updates – October 2024 Dr. Maohua Lu Nov 22, 2024 1547 -
Acess AI: Introducting the Future of Identity Security | Veza Jared Blistein Aug 06, 2024 631 -
Separation of Duties: Combating Toxic Combinations with SoD Controls | Veza Jared Blistein Aug 29, 2024 1365 -
12 Top IGA Software Vendors [2025 Guide] Veza Nov 08, 2024 3712 -
SOX Compliance Checklist: Your Sarbanes-Oxley Guide for 2025 Veza Dec 02, 2024 3188 -
Introducing Veza Access Requests: Automated, Policy-Driven Access at Scale Jared Blistein Dec 03, 2024 954 -
Posture of Access, 3 Pillars of Least Privilege | Ep 6, Identity Radicals Podcast with Adam Fletcher Veza Dec 10, 2024 162 -
Demonstrating PCI DSS 4.0 Compliance with Veza’s Identity Security Platform Mike Towers Dec 12, 2024 1892 -
Guide to Non-Human Identity Security Veza Jan 15, 2025 2445 -
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation Veza Jan 16, 2025 167 -
Veza Access AI – Applications of Gen AI for Identity Security Use Cases Shanmukh Sista Jan 21, 2025 2573 -
Modern Access Request Processes: Best Practices & What to Avoid in 2025 Veza Feb 03, 2025 3737 -
Access Request Management: A Complete Guide for 2025 Veza Dec 06, 2024 2387 -
Posture of Access, 3 Pillars of Least Privilege Veza Dec 10, 2024 167 -
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation Veza Jan 16, 2025 167 -
What is NIST Compliance? Guide & Checklist [2025] Veza Feb 13, 2025 2703 -
Access AI: Introducing the Future of Identity Security Jared Blistein Aug 06, 2024 643 -
8 Ways AI is Transforming Access Control in 2025 Veza Dec 20, 2024 2702 -
What is Privileged Access Management? [2025 Guide] Jared Blistein Nov 09, 2024 4192 -
Veza Product Updates – November 2024 Veza Feb 24, 2025 1710 -
SailPoint vs Saviynt vs Veza [2025 Review] Veza Nov 15, 2024 2740 -
The Evolution of Identity and Security at Workday: Insights from CISO Josh DeFigueiredo Veza Feb 27, 2025 585 -
10 top privileged access management (PAM) software solutions for 2025 Jared Blistein Jan 02, 2025 3894 -
Complete SailPoint Review & Top Alternatives [2024] Ellen Falltrick Dec 11, 2024 2471 -
How Veza Simplies SOX Compliance: Automating Access Controls & SoD Monitoring Amber Li Mar 07, 2025 1366 -
From Access Oversights to Audit Excellence: How Veza and Legacy IGA Secure SharePoint Environments Matthew Romero Mar 11, 2025 1177 -
Veza Product Updates – January Veza Jan 31, 2025 2520 -
Veza Product Updates – December 2024 Veza Dec 30, 2024 1397 -
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It Taylor Parsons Mar 25, 2025 979 -
From Access Oversights to Audit Excellence: How Veza and Legacy IGA Secure SharePoint Environments Matthew Romero Mar 11, 2025 1177 -
Achieving DORA Compliance: A Practical Guide for Financial Organizations Mike Towers Mar 24, 2025 1254 -
Reflections from Gartner IAM London: Visibility Leads to Observability Rob Rachwald Mar 25, 2025 424 -