78 blog posts published by month since the start of 2024. Start from a different year:

Blog URL
Posts year-to-date
3 (9 posts by this month last year.)
Average posts per month since 2024
3.3

Post details (2024 to today)

Title Author Date Word count HN points
Identity Security Spotlight: Delinea acquires Fastpath Veza Feb 26, 2024 337 -
Identity Security Spotlight: Cisco announces “Identity Intelligence” Veza Feb 08, 2024 41 -
Lessons from the breach: Microsoft and Midnight Blizzard Veza Feb 21, 2024 341 -
Identity Security Spotlight: Midnight Blizzard’s breach of Microsoft Veza Feb 07, 2024 340 -
What is Access Governance? A 2024 overview Jared Blistein Feb 23, 2024 2220 -
How to leverage Intelligent Access to de-risk the breach Rich Dandliker Jan 02, 2024 776 -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence Tarun Thakur Jan 31, 2024 644 -
User Access Reviews: How They Work & Best Practices Alisa Ho Feb 16, 2024 2516 -
Product updates: 2H Release Summary Dr. Maohua Lu Jan 05, 2024 1001 -
Join us at RSAC May 6-9, 2024 Veza Mar 13, 2024 154 -
GitHub Access Control, Access Management, Security, Roles, Authorization & More Veza Mar 15, 2024 1811 -
Veza welcomes Mike Towers as Chief Security & Trust Officer Veza Mar 15, 2024 70 -
Veza for Zscaler: Bringing least privilege to ZIA Veza Mar 22, 2024 342 -
Invisible keyholders: the importance of Non-Human Identity Management Mike Towers Mar 22, 2024 780 -
What is Identity Security? Veza Mar 29, 2024 2303 -
Key Takeaways: FBI Breach Prevention Tips Veza Apr 10, 2024 918 -
Veza for HashiCorp Vault: Bringing least privilege to Vault and Secrets Tarun Thakur Apr 12, 2024 386 -
Veza for Crowdstrike: Identify, triage and remediate in minutes Tarun Thakur Apr 12, 2024 217 -
Complete Snowflake Review: Roles, Security & Access Control Veza Apr 12, 2024 1971 -
Veza Product Updates – February 2024 Dr. Maohua Lu Apr 15, 2024 689 -
Identity Security Posture Management Tarun Thakur Apr 18, 2024 598 -
What is non-human identity management Veza Apr 19, 2024 2272 -
Veza Product Updates – March 2024 Dr. Maohua Lu Apr 19, 2024 903 -
The Imperative for Identity Security: A Call to Action for the Industry Mike Towers Apr 24, 2024 1043 -
Identity Security Spotlight: Ransomware attack on Ascension Veza May 17, 2024 59 -
The Veza Voice – Q1 2025 Mike Torres May 17, 2024 2009 -
What is IGA (Identity Governance & Administration)? Veza May 23, 2024 2286 -
Announcing The State of Access 2024 Tarun Thakur May 22, 2024 421 -
Harnessing the Power of AI: Identity Security as a Key Enabler Mike Towers May 23, 2024 867 -
AWS Guide: Access Governance, Security, Compliance & Roles [2024] Veza Jun 05, 2024 2990 -
Achieving, Demonstrating, and Maintaining PCI DSS Compliance with Veza: A Game-Changer for Financial Services Companies Mike Towers Jun 06, 2024 751 -
What is Machine Identity Management? [2024 Guide] Veza Jun 07, 2024 2838 -
Can you tell who has access to what in Snowflake? Kale Bogdanovs Jun 18, 2024 2050 -
Veza Product Updates – April 2024 Dr. Maohua Lu Jun 20, 2024 1708 -
The Critical Role of Identity Security in Enabling Zero Trust Mike Towers Jul 01, 2024 559 -
Authentication vs Authorization Veza Jul 02, 2024 2088 -
Role mining for Snowflake: four steps toward least privilege Santosh Kumar Jul 02, 2024 1706 -
Veza Product Updates – May 2024 Dr. Maohua Lu Jul 08, 2024 1422 -
Intelligent Access for custom apps: getting started with Veza’s Open Authorization API Zee Khoo Jul 11, 2024 2160 -
What is SaaS Sprawl? Veza Jul 11, 2024 2189 -
Mitigating the UNC3944 Threat: The Power of Modern Identity Security Platforms Mike Towers Jul 18, 2024 491 -
Join us at Black Hat USA August 3 – 8, 2024 Veza Jul 17, 2024 177 -
The MIGHT of Veza Amy Veater Jul 22, 2024 593 -
Veza Product Updates – June 2024 Dr. Maohua Lu Jul 24, 2024 1281 -
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security Rich Dandliker Jul 30, 2024 965 -
Empowering Business Initiatives with Modern Identity Security Mike Towers Aug 02, 2024 1244 -
AI for Identity Security: My Journey, Our Perspective, and Veza’s Strategy Rich Dandliker Aug 06, 2024 1278 -
Introducing Access AI: The Future of Identity Security Jared Blistein Aug 06, 2024 631 -
Veza Product Updates – July 2024 Dr. Maohua Lu Aug 19, 2024 1477 -
Securing Snowflake: A CISO’s Guide to Effective Access Control Mike Towers Aug 22, 2024 1283 -
Identity Radicals: Identity governance in the cloud era Veza Aug 26, 2024 1167 -
IBM’s 2024 Cost of a Data Breach Report: AI-Powered Security Lowers Costs Jared Blistein Aug 28, 2024 1652 -
Combating Toxic Combinations Through Separation of Duties (SoD) Controls Jared Blistein Aug 29, 2024 1365 -
Veza’s Automated Access Revocation and Access Remediation Tom Smith Sep 10, 2024 1000 -
Veza Product Updates – August 2024 Dr. Maohua Lu Sep 12, 2024 1153 -
Charting a Path for the Future of Identity Security Mike Towers Sep 23, 2024 1331 -
Identity Security Spotlight: Microsoft CISA Investigation Veza Apr 16, 2024 87 -
Risk scoring in Identity Security Santosh Kumar Oct 10, 2024 1517 -
Simplifying Security: The Power of Effective Access Control in Cybersecurity Mike Towers Oct 18, 2024 1005 -
Veza Product Updates – September 2024 Dr. Maohua Lu Oct 21, 2024 1800 -
Going Beyond Provisioning and Deprovisioning with Veza Lifecycle Management Sandler Rubin Oct 22, 2024 1465 -
Non-Human Identity Security: A Practical Guide to Mitigating Risk Jared Blistein Oct 29, 2024 1776 -
Operationalizing Modern Identity Security: A CISO’s Perspective on Value Creation and Sustainable Growth Mike Towers Nov 11, 2024 1187 -
SOC 2 Compliance Requirements [2025] Veza Nov 08, 2024 3593 -
Identity Radicals: Groundhog day in identity security Veza Nov 21, 2024 687 -
What is lifecycle management in identity security? Veza Nov 08, 2024 1925 -
IBM Cost of a Data Breach Report: AI Security Cost Reduction | Veza Jared Blistein Aug 28, 2024 1652 -
Veza Product Updates – October 2024 Dr. Maohua Lu Nov 22, 2024 1547 -
Acess AI: Introducting the Future of Identity Security | Veza Jared Blistein Aug 06, 2024 631 -
Separation of Duties: Combating Toxic Combinations with SoD Controls | Veza Jared Blistein Aug 29, 2024 1365 -
12 Top IGA Software Vendors [2025 Guide] Veza Nov 08, 2024 3712 -
SOX Compliance Checklist: Your Sarbanes-Oxley Guide for 2025 Veza Dec 02, 2024 3188 -
Introducing Veza Access Requests: Automated, Policy-Driven Access at Scale Jared Blistein Dec 03, 2024 954 -
Posture of Access, 3 Pillars of Least Privilege | Ep 6, Identity Radicals Podcast with Adam Fletcher Veza Dec 10, 2024 162 -
Demonstrating PCI DSS 4.0 Compliance with Veza’s Identity Security Platform Mike Towers Dec 12, 2024 1892 -
Guide to Non-Human Identity Security Veza Jan 15, 2025 2445 -
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation Veza Jan 16, 2025 167 -
Veza Access AI – Applications of Gen AI for Identity Security Use Cases Shanmukh Sista Jan 21, 2025 2573 -