Veza

Founded in 2020. Privately Held.

External links: homepage | blog | jobs | youtube | twitter | linkedin

Authorization platform for data.

Blog posts published by month since the start of

64 total blog posts published.

Switch to word count

Blog content

post title author published words HN
Identity Security Spotlight: Delinea acquires Fastpath Veza Feb. 26, 2024 337 -
Identity Security Spotlight: Cisco announces “Identity Intelligence” Veza Feb. 08, 2024 41 -
Lessons from the breach: Microsoft and Midnight Blizzard Veza Feb. 21, 2024 341 -
Identity Security Spotlight: Midnight Blizzard’s breach of Microsoft Veza Feb. 07, 2024 340 -
What is Access Governance? A 2024 overview Jared Blistein Feb. 23, 2024 2220 -
How to leverage Intelligent Access to de-risk the breach Rich Dandliker Jan. 02, 2024 776 -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence Tarun Thakur Jan. 31, 2024 644 -
User Access Reviews: How They Work & Best Practices Alisa Ho Feb. 16, 2024 2516 -
Product updates: 2H Release Summary Dr. Maohua Lu Jan. 05, 2024 1001 -
Join us at RSAC May 6-9, 2024 Veza Mar. 13, 2024 154 -
GitHub Access Control, Access Management, Security, Roles, Authorization & More Veza Mar. 15, 2024 1811 -
Veza welcomes Mike Towers as Chief Security & Trust Officer Veza Mar. 15, 2024 70 -
Veza for Zscaler: Bringing least privilege to ZIA Veza Mar. 22, 2024 342 -
Invisible keyholders: the importance of Non-Human Identity Management Mike Towers Mar. 22, 2024 780 -
What is Identity Security? Veza Mar. 29, 2024 2303 -
Key Takeaways: FBI Breach Prevention Tips Veza Apr. 10, 2024 918 -
Veza for HashiCorp Vault: Bringing least privilege to Vault and Secrets Tarun Thakur Apr. 12, 2024 386 -
Veza for Crowdstrike: Identify, triage and remediate in minutes Tarun Thakur Apr. 12, 2024 217 -
Complete Snowflake Review: Roles, Security & Access Control Veza Apr. 12, 2024 1971 -
Veza Product Updates – February 2024 Dr. Maohua Lu Apr. 15, 2024 689 -
Identity Security Posture Management Tarun Thakur Apr. 18, 2024 598 -
What is non-human identity management Veza Apr. 19, 2024 2272 -
Veza Product Updates – March 2024 Dr. Maohua Lu Apr. 19, 2024 903 -
The Imperative for Identity Security: A Call to Action for the Industry Mike Towers Apr. 24, 2024 1043 -
Identity Security Spotlight: Ransomware attack on Ascension Veza May. 17, 2024 59 -
The Veza Voice – Q1 2025 Mike Torres May. 17, 2024 2009 -
What is IGA (Identity Governance & Administration)? Veza May. 23, 2024 2286 -
Announcing The State of Access 2024 Tarun Thakur May. 22, 2024 421 -
Harnessing the Power of AI: Identity Security as a Key Enabler Mike Towers May. 23, 2024 867 -
AWS Guide: Access Governance, Security, Compliance & Roles [2024] Veza Jun. 05, 2024 2990 -
Achieving, Demonstrating, and Maintaining PCI DSS Compliance with Veza: A Game-Changer for Financial Services Companies Mike Towers Jun. 06, 2024 751 -
What is Machine Identity Management? [2024 Guide] Veza Jun. 07, 2024 2838 -
Can you tell who has access to what in Snowflake? Kale Bogdanovs Jun. 18, 2024 2050 -
Veza Product Updates – April 2024 Dr. Maohua Lu Jun. 20, 2024 1708 -
The Critical Role of Identity Security in Enabling Zero Trust Mike Towers Jul. 01, 2024 559 -
Authentication vs Authorization Veza Jul. 02, 2024 2088 -
Role mining for Snowflake: four steps toward least privilege Santosh Kumar Jul. 02, 2024 1706 -
Veza Product Updates – May 2024 Dr. Maohua Lu Jul. 08, 2024 1422 -
Intelligent Access for custom apps: getting started with Veza’s Open Authorization API Zee Khoo Jul. 11, 2024 2160 -
What is SaaS Sprawl? Veza Jul. 11, 2024 2189 -
Mitigating the UNC3944 Threat: The Power of Modern Identity Security Platforms Mike Towers Jul. 18, 2024 491 -
Join us at Black Hat USA August 3 – 8, 2024 Veza Jul. 17, 2024 177 -
The MIGHT of Veza Amy Veater Jul. 22, 2024 593 -
Veza Product Updates – June 2024 Dr. Maohua Lu Jul. 24, 2024 1281 -
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security Rich Dandliker Jul. 30, 2024 965 -
Empowering Business Initiatives with Modern Identity Security Mike Towers Aug. 02, 2024 1244 -
AI for Identity Security: My Journey, Our Perspective, and Veza’s Strategy Rich Dandliker Aug. 06, 2024 1278 -
Introducing Access AI: The Future of Identity Security Jared Blistein Aug. 06, 2024 631 -
Veza Product Updates – July 2024 Dr. Maohua Lu Aug. 19, 2024 1477 -
Securing Snowflake: A CISO’s Guide to Effective Access Control Mike Towers Aug. 22, 2024 1283 -
Identity Radicals: Identity governance in the cloud era Veza Aug. 26, 2024 1167 -
IBM’s 2024 Cost of a Data Breach Report: AI-Powered Security Lowers Costs Jared Blistein Aug. 28, 2024 1652 -
Combating Toxic Combinations Through Separation of Duties (SoD) Controls Jared Blistein Aug. 29, 2024 1365 -
Veza’s Automated Access Revocation and Access Remediation Tom Smith Sep. 10, 2024 1000 -
Veza Product Updates – August 2024 Dr. Maohua Lu Sep. 12, 2024 1153 -
Charting a Path for the Future of Identity Security Mike Towers Sep. 23, 2024 1331 -
Identity Security Spotlight: Microsoft CISA Investigation Veza Apr. 16, 2024 87 -
Risk scoring in Identity Security Santosh Kumar Oct. 10, 2024 1517 -
Simplifying Security: The Power of Effective Access Control in Cybersecurity Mike Towers Oct. 18, 2024 1005 -
Veza Product Updates – September 2024 Dr. Maohua Lu Oct. 21, 2024 1800 -
Going Beyond Provisioning and Deprovisioning with Veza Lifecycle Management Sandler Rubin Oct. 22, 2024 1465 -
Non-Human Identity Security: A Practical Guide to Mitigating Risk Jared Blistein Oct. 29, 2024 1776 -
Operationalizing Modern Identity Security: A CISO’s Perspective on Value Creation and Sustainable Growth Mike Towers Nov. 11, 2024 1187 -
SOC 2 Compliance Requirements [2025] Veza Nov. 08, 2024 3593 -

By Matt Makai. 2021-2024.