Identity Security Spotlight: Delinea acquires Fastpath |
Veza |
Feb 26, 2024 |
337 |
- |
Identity Security Spotlight: Cisco announces “Identity Intelligence” |
Veza |
Feb 08, 2024 |
41 |
- |
Lessons from the breach: Microsoft and Midnight Blizzard |
Veza |
Feb 21, 2024 |
341 |
- |
Identity Security Spotlight: Midnight Blizzard’s breach of Microsoft |
Veza |
Feb 07, 2024 |
340 |
- |
What is Access Governance? A 2024 overview |
Jared Blistein |
Feb 23, 2024 |
2220 |
- |
How to leverage Intelligent Access to de-risk the breach |
Rich Dandliker |
Jan 02, 2024 |
776 |
- |
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence |
Tarun Thakur |
Jan 31, 2024 |
644 |
- |
User Access Reviews: How They Work & Best Practices |
Alisa Ho |
Feb 16, 2024 |
2516 |
- |
Product updates: 2H Release Summary |
Dr. Maohua Lu |
Jan 05, 2024 |
1001 |
- |
Join us at RSAC May 6-9, 2024 |
Veza |
Mar 13, 2024 |
154 |
- |
GitHub Access Control, Access Management, Security, Roles, Authorization & More |
Veza |
Mar 15, 2024 |
1811 |
- |
Veza welcomes Mike Towers as Chief Security & Trust Officer |
Veza |
Mar 15, 2024 |
70 |
- |
Veza for Zscaler: Bringing least privilege to ZIA |
Veza |
Mar 22, 2024 |
342 |
- |
Invisible keyholders: the importance of Non-Human Identity Management |
Mike Towers |
Mar 22, 2024 |
780 |
- |
What is Identity Security? |
Veza |
Mar 29, 2024 |
2303 |
- |
Key Takeaways: FBI Breach Prevention Tips |
Veza |
Apr 10, 2024 |
918 |
- |
Veza for HashiCorp Vault: Bringing least privilege to Vault and Secrets |
Tarun Thakur |
Apr 12, 2024 |
386 |
- |
Veza for Crowdstrike: Identify, triage and remediate in minutes |
Tarun Thakur |
Apr 12, 2024 |
217 |
- |
Complete Snowflake Review: Roles, Security & Access Control |
Veza |
Apr 12, 2024 |
1971 |
- |
Veza Product Updates – February 2024 |
Dr. Maohua Lu |
Apr 15, 2024 |
689 |
- |
Identity Security Posture Management |
Tarun Thakur |
Apr 18, 2024 |
598 |
- |
What is non-human identity management |
Veza |
Apr 19, 2024 |
2272 |
- |
Veza Product Updates – March 2024 |
Dr. Maohua Lu |
Apr 19, 2024 |
903 |
- |
The Imperative for Identity Security: A Call to Action for the Industry |
Mike Towers |
Apr 24, 2024 |
1043 |
- |
Identity Security Spotlight: Ransomware attack on Ascension |
Veza |
May 17, 2024 |
59 |
- |
The Veza Voice – Q1 2025 |
Mike Torres |
May 17, 2024 |
2009 |
- |
What is IGA (Identity Governance & Administration)? |
Veza |
May 23, 2024 |
2286 |
- |
Announcing The State of Access 2024 |
Tarun Thakur |
May 22, 2024 |
421 |
- |
Harnessing the Power of AI: Identity Security as a Key Enabler |
Mike Towers |
May 23, 2024 |
867 |
- |
AWS Guide: Access Governance, Security, Compliance & Roles [2024] |
Veza |
Jun 05, 2024 |
2990 |
- |
Achieving, Demonstrating, and Maintaining PCI DSS Compliance with Veza: A Game-Changer for Financial Services Companies |
Mike Towers |
Jun 06, 2024 |
751 |
- |
What is Machine Identity Management? [2024 Guide] |
Veza |
Jun 07, 2024 |
2838 |
- |
Can you tell who has access to what in Snowflake? |
Kale Bogdanovs |
Jun 18, 2024 |
2050 |
- |
Veza Product Updates – April 2024 |
Dr. Maohua Lu |
Jun 20, 2024 |
1708 |
- |
The Critical Role of Identity Security in Enabling Zero Trust |
Mike Towers |
Jul 01, 2024 |
559 |
- |
Authentication vs Authorization |
Veza |
Jul 02, 2024 |
2088 |
- |
Role mining for Snowflake: four steps toward least privilege |
Santosh Kumar |
Jul 02, 2024 |
1706 |
- |
Veza Product Updates – May 2024 |
Dr. Maohua Lu |
Jul 08, 2024 |
1422 |
- |
Intelligent Access for custom apps: getting started with Veza’s Open Authorization API |
Zee Khoo |
Jul 11, 2024 |
2160 |
- |
What is SaaS Sprawl? |
Veza |
Jul 11, 2024 |
2189 |
- |
Mitigating the UNC3944 Threat: The Power of Modern Identity Security Platforms |
Mike Towers |
Jul 18, 2024 |
491 |
- |
Join us at Black Hat USA August 3 – 8, 2024 |
Veza |
Jul 17, 2024 |
177 |
- |
The MIGHT of Veza |
Amy Veater |
Jul 22, 2024 |
593 |
- |
Veza Product Updates – June 2024 |
Dr. Maohua Lu |
Jul 24, 2024 |
1281 |
- |
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security |
Rich Dandliker |
Jul 30, 2024 |
965 |
- |
Empowering Business Initiatives with Modern Identity Security |
Mike Towers |
Aug 02, 2024 |
1244 |
- |
AI for Identity Security: My Journey, Our Perspective, and Veza’s Strategy |
Rich Dandliker |
Aug 06, 2024 |
1278 |
- |
Introducing Access AI: The Future of Identity Security |
Jared Blistein |
Aug 06, 2024 |
631 |
- |
Veza Product Updates – July 2024 |
Dr. Maohua Lu |
Aug 19, 2024 |
1477 |
- |
Securing Snowflake: A CISO’s Guide to Effective Access Control |
Mike Towers |
Aug 22, 2024 |
1283 |
- |
Identity Radicals: Identity governance in the cloud era |
Veza |
Aug 26, 2024 |
1167 |
- |
IBM’s 2024 Cost of a Data Breach Report: AI-Powered Security Lowers Costs |
Jared Blistein |
Aug 28, 2024 |
1652 |
- |
Combating Toxic Combinations Through Separation of Duties (SoD) Controls |
Jared Blistein |
Aug 29, 2024 |
1365 |
- |
Veza’s Automated Access Revocation and Access Remediation |
Tom Smith |
Sep 10, 2024 |
1000 |
- |
Veza Product Updates – August 2024 |
Dr. Maohua Lu |
Sep 12, 2024 |
1153 |
- |
Charting a Path for the Future of Identity Security |
Mike Towers |
Sep 23, 2024 |
1331 |
- |
Identity Security Spotlight: Microsoft CISA Investigation |
Veza |
Apr 16, 2024 |
87 |
- |
Risk scoring in Identity Security |
Santosh Kumar |
Oct 10, 2024 |
1517 |
- |
Simplifying Security: The Power of Effective Access Control in Cybersecurity |
Mike Towers |
Oct 18, 2024 |
1005 |
- |
Veza Product Updates – September 2024 |
Dr. Maohua Lu |
Oct 21, 2024 |
1800 |
- |
Going Beyond Provisioning and Deprovisioning with Veza Lifecycle Management |
Sandler Rubin |
Oct 22, 2024 |
1465 |
- |
Non-Human Identity Security: A Practical Guide to Mitigating Risk |
Jared Blistein |
Oct 29, 2024 |
1776 |
- |
Operationalizing Modern Identity Security: A CISO’s Perspective on Value Creation and Sustainable Growth |
Mike Towers |
Nov 11, 2024 |
1187 |
- |
SOC 2 Compliance Requirements [2025] |
Veza |
Nov 08, 2024 |
3593 |
- |
Identity Radicals: Groundhog day in identity security |
Veza |
Nov 21, 2024 |
687 |
- |
What is lifecycle management in identity security? |
Veza |
Nov 08, 2024 |
1925 |
- |
IBM Cost of a Data Breach Report: AI Security Cost Reduction | Veza |
Jared Blistein |
Aug 28, 2024 |
1652 |
- |
Veza Product Updates – October 2024 |
Dr. Maohua Lu |
Nov 22, 2024 |
1547 |
- |
Acess AI: Introducting the Future of Identity Security | Veza |
Jared Blistein |
Aug 06, 2024 |
631 |
- |
Separation of Duties: Combating Toxic Combinations with SoD Controls | Veza |
Jared Blistein |
Aug 29, 2024 |
1365 |
- |
12 Top IGA Software Vendors [2025 Guide] |
Veza |
Nov 08, 2024 |
3712 |
- |
SOX Compliance Checklist: Your Sarbanes-Oxley Guide for 2025 |
Veza |
Dec 02, 2024 |
3188 |
- |
Introducing Veza Access Requests: Automated, Policy-Driven Access at Scale |
Jared Blistein |
Dec 03, 2024 |
954 |
- |
Posture of Access, 3 Pillars of Least Privilege | Ep 6, Identity Radicals Podcast with Adam Fletcher |
Veza |
Dec 10, 2024 |
162 |
- |
Demonstrating PCI DSS 4.0 Compliance with Veza’s Identity Security Platform |
Mike Towers |
Dec 12, 2024 |
1892 |
- |
Guide to Non-Human Identity Security |
Veza |
Jan 15, 2025 |
2445 |
- |
Beyond the Buzzwords: Identity, Zero Trust, and Digital Transformation |
Veza |
Jan 16, 2025 |
167 |
- |
Veza Access AI – Applications of Gen AI for Identity Security Use Cases |
Shanmukh Sista |
Jan 21, 2025 |
2573 |
- |