99 blog posts published by month since the start of 2024. Start from a different year:

Blog URL
Posts year-to-date
16 (25 posts by this month last year.)
Average posts per month since 2024
4.1

Post details (2024 to today)

Title Author Date Word count HN points
Identity Security Spotlight: Delinea acquires Fastpath Veza Feb 26, 2024 337 -
Identity Security Spotlight: Cisco announces “Identity Intelligence” Veza Feb 08, 2024 41 -
Lessons from the breach: Microsoft and Midnight Blizzard Veza Feb 21, 2024 341 -
Identity Security Spotlight: Midnight Blizzard’s breach of Microsoft Veza Feb 07, 2024 340 -
What is Access Governance? A 2024 overview Jared Blistein Feb 23, 2024 2220 -
How to leverage Intelligent Access to de-risk the breach Rich Dandliker Jan 02, 2024 776 -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence Tarun Thakur Jan 31, 2024 644 -
User Access Reviews: How They Work & Best Practices Alisa Ho Feb 16, 2024 2516 -
Product updates: 2H Release Summary Dr. Maohua Lu Jan 05, 2024 1001 -
Join us at RSAC May 6-9, 2024 Veza Mar 13, 2024 154 -
GitHub Access Control, Access Management, Security, Roles, Authorization & More Veza Mar 15, 2024 1811 -
Veza welcomes Mike Towers as Chief Security & Trust Officer Veza Mar 15, 2024 70 -
Veza for Zscaler: Bringing least privilege to ZIA Veza Mar 22, 2024 342 -
Invisible keyholders: the importance of Non-Human Identity Management Mike Towers Mar 22, 2024 780 -
What is Identity Security? Veza Mar 29, 2024 2303 -
Key Takeaways: FBI Breach Prevention Tips Veza Apr 10, 2024 918 -
Veza for HashiCorp Vault: Bringing least privilege to Vault and Secrets Tarun Thakur Apr 12, 2024 386 -
Veza for Crowdstrike: Identify, triage and remediate in minutes Tarun Thakur Apr 12, 2024 217 -
Complete Snowflake Review: Roles, Security & Access Control Veza Apr 12, 2024 1971 -
Veza Product Updates – February 2024 Dr. Maohua Lu Apr 15, 2024 689 -
Identity Security Posture Management Tarun Thakur Apr 18, 2024 598 -
What is non-human identity management Veza Apr 19, 2024 2272 -
Veza Product Updates – March 2024 Dr. Maohua Lu Apr 19, 2024 903 -
The Imperative for Identity Security: A Call to Action for the Industry Mike Towers Apr 24, 2024 1043 -
Identity Security Spotlight: Ransomware attack on Ascension Veza May 17, 2024 59 -
The Veza Voice – Q1 2025 Mike Torres May 17, 2024 2009 -
What is IGA (Identity Governance & Administration)? Veza May 23, 2024 2286 -
Announcing The State of Access 2024 Tarun Thakur May 22, 2024 421 -
Harnessing the Power of AI: Identity Security as a Key Enabler Mike Towers May 23, 2024 867 -
AWS Guide: Access Governance, Security, Compliance & Roles [2024] Veza Jun 05, 2024 2990 -
Achieving, Demonstrating, and Maintaining PCI DSS Compliance with Veza: A Game-Changer for Financial Services Companies Mike Towers Jun 06, 2024 751 -
What is Machine Identity Management? [2024 Guide] Veza Jun 07, 2024 2838 -
Can you tell who has access to what in Snowflake? Kale Bogdanovs Jun 18, 2024 2050 -
Veza Product Updates – April 2024 Dr. Maohua Lu Jun 20, 2024 1708 -
The Critical Role of Identity Security in Enabling Zero Trust Mike Towers Jul 01, 2024 559 -
Authentication vs Authorization Veza Jul 02, 2024 2088 -
Role mining for Snowflake: four steps toward least privilege Santosh Kumar Jul 02, 2024 1706 -
Veza Product Updates – May 2024 Dr. Maohua Lu Jul 08, 2024 1422 -
Intelligent Access for custom apps: getting started with Veza’s Open Authorization API Zee Khoo Jul 11, 2024 2160 -
What is SaaS Sprawl? Veza Jul 11, 2024 2189 -
Mitigating the UNC3944 Threat: The Power of Modern Identity Security Platforms Mike Towers Jul 18, 2024 491 -
Join us at Black Hat USA August 3 – 8, 2024 Veza Jul 17, 2024 177 -
The MIGHT of Veza Amy Veater Jul 22, 2024 593 -
Veza Product Updates – June 2024 Dr. Maohua Lu Jul 24, 2024 1281 -
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security Rich Dandliker Jul 30, 2024 965 -
Empowering Business Initiatives with Modern Identity Security Mike Towers Aug 02, 2024 1244 -
AI for Identity Security: My Journey, Our Perspective, and Veza’s Strategy Rich Dandliker Aug 06, 2024 1278 -
Introducing Access AI: The Future of Identity Security Jared Blistein Aug 06, 2024 631 -
Veza Product Updates – July 2024 Dr. Maohua Lu Aug 19, 2024 1477 -
Securing Snowflake: A CISO’s Guide to Effective Access Control Mike Towers Aug 22, 2024 1283 -
Identity Radicals: Identity governance in the cloud era Veza Aug 26, 2024 1167 -
IBM’s 2024 Cost of a Data Breach Report: AI-Powered Security Lowers Costs Jared Blistein Aug 28, 2024 1652 -
Combating Toxic Combinations Through Separation of Duties (SoD) Controls Jared Blistein Aug 29, 2024 1365 -
Veza’s Automated Access Revocation and Access Remediation Tom Smith Sep 10, 2024 1000 -
Veza Product Updates – August 2024 Dr. Maohua Lu Sep 12, 2024 1153 -
Charting a Path for the Future of Identity Security Mike Towers Sep 23, 2024 1331 -
Identity Security Spotlight: Microsoft CISA Investigation Veza Apr 16, 2024 87 -
Risk scoring in Identity Security Santosh Kumar Oct 10, 2024 1517 -
Simplifying Security: The Power of Effective Access Control in Cybersecurity Mike Towers Oct 18, 2024 1005 -
Veza Product Updates – September 2024 Dr. Maohua Lu Oct 21, 2024 1800 -
Going Beyond Provisioning and Deprovisioning with Veza Lifecycle Management Sandler Rubin Oct 22, 2024 1465 -
Non-Human Identity Security: A Practical Guide to Mitigating Risk Jared Blistein Oct 29, 2024 1776 -
Operationalizing Modern Identity Security: A CISO’s Perspective on Value Creation and Sustainable Growth Mike Towers Nov 11, 2024 1187 -
SOC 2 Compliance Requirements [2025] Veza Nov 08, 2024 3593 -
Identity Radicals: Groundhog day in identity security Veza Nov 21, 2024 687 -
What is lifecycle management in identity security? Veza Nov 08, 2024 1925 -
IBM Cost of a Data Breach Report: AI Security Cost Reduction | Veza Jared Blistein Aug 28, 2024 1652 -
Veza Product Updates – October 2024 Dr. Maohua Lu Nov 22, 2024 1547 -
Acess AI: Introducting the Future of Identity Security | Veza Jared Blistein Aug 06, 2024 631 -
Separation of Duties: Combating Toxic Combinations with SoD Controls | Veza Jared Blistein Aug 29, 2024 1365 -
12 Top IGA Software Vendors [2025 Guide] Veza Nov 08, 2024 3712 -
SOX Compliance Checklist: Your Sarbanes-Oxley Guide for 2025 Veza Dec 02, 2024 3188 -
Introducing Veza Access Requests: Automated, Policy-Driven Access at Scale Jared Blistein Dec 03, 2024 954 -
Posture of Access, 3 Pillars of Least Privilege | Ep 6, Identity Radicals Podcast with Adam Fletcher Veza Dec 10, 2024 162 -
Demonstrating PCI DSS 4.0 Compliance with Veza’s Identity Security Platform Mike Towers Dec 12, 2024 1892 -
Guide to Non-Human Identity Security Veza Jan 15, 2025 2445 -
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation Veza Jan 16, 2025 167 -
Veza Access AI – Applications of Gen AI for Identity Security Use Cases Shanmukh Sista Jan 21, 2025 2573 -
Modern Access Request Processes: Best Practices & What to Avoid in 2025 Veza Feb 03, 2025 3737 -
Access Request Management: A Complete Guide for 2025 Veza Dec 06, 2024 2387 -
Posture of Access, 3 Pillars of Least Privilege Veza Dec 10, 2024 167 -
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation Veza Jan 16, 2025 167 -
What is NIST Compliance? Guide & Checklist [2025] Veza Feb 13, 2025 2703 -
Access AI: Introducing the Future of Identity Security Jared Blistein Aug 06, 2024 643 -
8 Ways AI is Transforming Access Control in 2025 Veza Dec 20, 2024 2702 -
What is Privileged Access Management? [2025 Guide] Jared Blistein Nov 09, 2024 4192 -
Veza Product Updates – November 2024 Veza Feb 24, 2025 1710 -
SailPoint vs Saviynt vs Veza [2025 Review] Veza Nov 15, 2024 2740 -
The Evolution of Identity and Security at Workday: Insights from CISO Josh DeFigueiredo Veza Feb 27, 2025 585 -
10 top privileged access management (PAM) software solutions for 2025 Jared Blistein Jan 02, 2025 3894 -
Complete SailPoint Review & Top Alternatives [2024] Ellen Falltrick Dec 11, 2024 2471 -
How Veza Simplies SOX Compliance: Automating Access Controls & SoD Monitoring Amber Li Mar 07, 2025 1366 -
From Access Oversights to Audit Excellence: How Veza and Legacy IGA Secure SharePoint Environments Matthew Romero Mar 11, 2025 1177 -
Veza Product Updates – January Veza Jan 31, 2025 2520 -
Veza Product Updates – December 2024 Veza Dec 30, 2024 1397 -
GitHub OAuth Attack Alert: A Developer’s Worst Nightmare and How to Prevent It Taylor Parsons Mar 25, 2025 979 -
From Access Oversights to Audit Excellence: How Veza and Legacy IGA Secure SharePoint Environments Matthew Romero Mar 11, 2025 1177 -
Achieving DORA Compliance: A Practical Guide for Financial Organizations Mike Towers Mar 24, 2025 1254 -
Reflections from Gartner IAM London: Visibility Leads to Observability Rob Rachwald Mar 25, 2025 424 -