Veza

Founded in 2020. Privately Held.

External links: homepage | blog | jobs | youtube | twitter | linkedin

Authorization platform for data.

Blog content published by word count

Switch to post count

Blog content

post title author published words HN
Employee Spotlight: Teju Shyamsundar, Head of Product Marketing Josh Ashton Oct. 10, 2022 1031 -
Employee Spotlight: Bobby Jackson, Regional Sales Director Josh Ashton Sep. 22, 2022 489 -
Veza Has Passed a New Milestone as it Modernizes Identity Security Jason Garoutte Jun. 22, 2023 1602 -
Three key lessons from last week's Okta breach Kale Bogdanovs Oct. 27, 2023 950 -
A Practitioner’s Guide to Intelligent Access Tarun Thakur Dec. 20, 2023 876 -
Why I’m excited about the future of Veza Niels Provos May. 03, 2022 808 -
Join Us at Oktane: Explore “Bad Permissions” and Veza’s Access Solutions Veza Sep. 20, 2023 225 -
Identity Security Spotlight: Delinea acquires Fastpath Veza Feb. 26, 2024 337 -
Identity Security Spotlight: Cisco announces “Identity Intelligence” Veza Feb. 08, 2024 41 -
Lessons from the breach: Microsoft and Midnight Blizzard Veza Feb. 21, 2024 341 -
Cybersecurity Theater: The Show Must (Not) Go On Teju Shyamsundar Oct. 19, 2022 1138 -
Identity Security Spotlight: Midnight Blizzard’s breach of Microsoft Veza Feb. 07, 2024 340 -
Snowflake security: how to manage entitlement creep Kale Bogdanovs Feb. 28, 2023 1659 -
Veza @ Snowflake Summit – June 26-29 Regina Soller-Gould Jun. 23, 2023 107 -
Three tips for collaborating safely in Slack Kale Bogdanovs Feb. 22, 2023 1326 -
5 Actionable Strategies to Improve Security Posture Eugene Feldman Dec. 01, 2023 438 -
Six takeaways from the Gartner IT Symposium 2023 Jason Garoutte Oct. 27, 2023 2019 -
The Veza Voice – December Issue Kale Bogdanovs Dec. 15, 2022 948 -
Beyond IAM: Zero Trust Needs A Second Act in Identity Rich Dandliker Mar. 20, 2023 1330 -
Can you make sense of permissions in AWS? Kale Bogdanovs Nov. 17, 2023 996 -
RBAC vs ABAC: Access Control Explained Kale Bogdanovs Aug. 15, 2022 1697 -
Authorization: The Missing Piece of Cloud Security Teju Shyamsundar Apr. 07, 2022 1357 -
Why Veza, Why Now? Tarun Thakur Oct. 10, 2023 1321 -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence Tarun Thakur Jul. 21, 2023 644 -
Veza @ AWS re:Invent Regina Soller-Gould Nov. 06, 2023 195 -
Three key lessons from unauthorized access to Okta’s support system Kale Bogdanovs Oct. 27, 2023 906 -
The Principle of Least Privilege Explained Kale Bogdanovs May. 25, 2023 3042 -
What is Access Governance? A 2024 overview Jared Blistein Feb. 23, 2024 2220 -
How to leverage Intelligent Access to de-risk the breach Rich Dandliker Jan. 02, 2024 776 -
The Fundamentals of a Data-Centric Approach to Cloud Security Teju Shyamsundar Jun. 07, 2022 1425 -
The Veza Voice – February issue Mike Bartholomy Mar. 01, 2023 1229 -
The Veza Voice – May Issue Dr. Maohua Lu May. 31, 2023 966 -
Understanding and protecting against the rising threat of Whale Phishing Ellen Falltrick Feb. 27, 2023 1884 -
What Least Privilege Means in Practice Teju Shyamsundar Apr. 25, 2022 1111 -
Digital Transformation and the Data Authorization Imperative Yousuf Khan May. 05, 2022 892 -
How to secure access to your source code in GitHub Rich Dandliker Mar. 01, 2023 1294 -
Data Security: The Challenge of Securing Service Accounts AK Khan May. 04, 2022 1104 -
Veza @ Fal.Con 2023 Regina Soller-Gould Sep. 11, 2023 152 -
The year of Intelligent Access Tarun Thakur Dec. 20, 2023 1402 -
A field guide to bad permissions, part 3: excessive permissions Kale Bogdanovs Dec. 16, 2023 1243 -
History of Hacks: SSRF attacks on AWS Ellen Falltrick May. 31, 2023 85 -
Veza at RSA Regina Soller-Gould Apr. 05, 2023 188 -
Into the VezaVerse: SaaS access security & governance Kale Bogdanovs May. 25, 2023 201 -
The Next Wave of Implementing Zero Trust: Moving from Authentication to Authorization Rich Dandliker May. 31, 2022 1723 -
The hard thing about Zero Trust Jason Garoutte Mar. 20, 2023 546 -
Authorization – The New Age of Cloud Identity Cody Sanford May. 11, 2022 911 -
Five ways to stop ransomware attacks Kale Bogdanovs May. 19, 2023 2167 -
Welcome, Phil Venables, to the Veza Board of Directors! Tarun Thakur Jul. 19, 2023 986 -
Veza Welcomes Gertie the Goat to Board of Advisors Veza Apr. 01, 2023 499 -
A field guide to bad permissions, part 1: ungoverned permissions Kale Bogdanovs Nov. 21, 2023 1219 -
Security Predictions for 2023 and Beyond Tarun Thakur Jan. 06, 2023 682 -
A field guide to bad permissions part 4: policy-violating permissions Kale Bogdanovs Dec. 21, 2023 1026 -
Identity Targeting: A Growing Threat with Rachel Wilson | Ep 1 Veza Oct. 05, 2023 378 -
Disrupting Breaches and Advancing InfoSec with David Tyburski | Ep 2 Veza Oct. 20, 2023 389 -
Veza @ Blackstone: Modernizing IGA with Automation and Intelligence Tarun Thakur Jan. 31, 2024 644 -
Integrate custom applications into a single control plane for authorization, with Open Authorization API Jim Lester Jan. 09, 2023 1267 -
AWS Verified Permissions release points towards the “Beyond IAM” era Kale Bogdanovs Jun. 23, 2023 986 -
Veza @ Gartner Symposium — October 15-19 Regina Soller-Gould Oct. 25, 2023 219 -
Why I Put My Hoof Down & Joined Veza Gertie the Goat Mar. 20, 2023 907 -
User Access Reviews: How They Work & Best Practices Alisa Ho Feb. 16, 2024 2516 -
What is identity security and why is it so complicated? Eugene Feldman Dec. 08, 2023 1125 -
A field guide to bad permissions part 2: expired permissions Kale Bogdanovs Nov. 30, 2023 1219 -
Veza Product Update – April 2023 Dr. Maohua Lu May. 12, 2023 758 -
The Five Tenets of Next-Gen IGA Jason Garoutte Nov. 20, 2023 2312 -
The Veza Voice – January Issue Mike Bartholomy Jan. 30, 2023 722 -
Rethinking Data Security with Veza Craig Rosen May. 05, 2022 941 -
Ransomware supply chain threats: What made a global automotive company shut their plants this past spring? Teju Shyamsundar Oct. 07, 2022 1048 -
Welcome to the Identity Radicals Podcast Veza Sep. 27, 2023 196 -
Solving the Long-Tail Integration Problem with an Open Platform Strategy: Meet the Open Authorization API (OAA) Rich Dandliker Apr. 26, 2022 1365 -
Identiverse 2022 – where are we after a rapid move to cloud data? Teju Shyamsundar Jul. 07, 2022 840 -
Authorization, NOT Authentication: the critical backbone for zero-trust security Tarek Khaled May. 10, 2022 1511 -
Snowflake security: how to manage and secure data access at scale Kale Bogdanovs Feb. 21, 2023 1268 -
History of Hacks: Outmaneuvering MFA Ellen Falltrick Jun. 07, 2023 98 -
The Age of Identity Security is here: Microsoft goes all-in on identity with Microsoft Entra Brian Schwarz Jul. 28, 2023 644 -
Veza Product Update – June 2023 Dr. Maohua Lu Jul. 26, 2023 900 -
The Basics of AWS IAM – Keeping Cloud Expansion Secure with Identity and Access Management for AWS Kale Bogdanovs Apr. 22, 2022 1679 -
Find and eliminate direct assignment of apps in your identity platform. Kale Bogdanovs Mar. 10, 2023 111 -
Why it’s Important to Understand Effective Permissions David “Wick” Sedgwick Apr. 25, 2022 1413 -
Security’s Next Frontier – Modernizing Data Security through Authorization for a Cloud-First Future Rich Dandliker Apr. 22, 2022 1047 -
Into the VezaVerse: Veza for Slack Kale Bogdanovs Jan. 31, 2023 136 -
Identity-Security Trends: Expectations vs Reality in Securing Data Teju Shyamsundar Jul. 26, 2022 845 -
Veza at Gartner IAM Regina Soller-Gould Mar. 20, 2023 257 -
5 Keys To Securing Your Data in a Multi-Cloud Environment Teju Shyamsundar Jun. 14, 2022 1068 -
History of Hacks: Orphaned Accounts Ellen Falltrick Aug. 01, 2023 98 -
The Veza Voice – March Issue Mike Bartholomy Apr. 11, 2023 1053 -
BlackHat USA 2022 Recap – 25 years of InfoSec Teju Shyamsundar Sep. 14, 2022 556 -
The Identity Authorization Approach to SaaS Access Governance Ellen Falltrick May. 03, 2023 1718 -
How strong is your SaaS Security Posture Management (SSPM)? Ellen Falltrick Apr. 12, 2023 2410 -
Decoding Data Sovereignty with Jenner Holden | Ep 3 Veza Nov. 02, 2023 430 -
Veza’s Founding Principles Kale Bogdanovs Apr. 06, 2022 737 -
Introducing Veza — Our Quest to Advance the Data Security Industry for Decades to Come Tarun Thakur Apr. 27, 2022 1361 -
Product updates: 2H Release Summary Dr. Maohua Lu Jan. 05, 2024 1001 -
Veza Secures Strategic Investment from Capital One Ventures and ServiceNow Ventures to Accelerate Identity Security Tarun Thakur Aug. 10, 2023 983 -
The Limits of “Man-in-the-Middle” Architecture for Authorization Rich Dandliker Jan. 25, 2023 625 -
Building Veza’s Platform and Products Tarun Thakur Aug. 15, 2023 996 -
Veza @ AWS re:Inforce June 13-14 Regina Soller-Gould Jun. 07, 2023 152 -
What is data security? Teju Shyamsundar May. 24, 2022 1220 -
Defend Against Ransomware with Authorization Monica Armand Nov. 03, 2022 658 -
Salesforce security, roles, privileged access management, and more Veza Mar. 08, 2022 1985 -
Join us at RSAC May 6-9, 2024 Veza Mar. 13, 2024 154 -
GitHub Access Control, Access Management, Security, Roles, Authorization & More Veza Mar. 15, 2024 1811 -
Veza welcomes Mike Towers as Chief Security & Trust Officer Veza Mar. 15, 2024 70 -
Veza for Zscaler: Bringing least privilege to ZIA Veza Mar. 22, 2024 342 -
Invisible keyholders: the importance of Non-Human Identity Management Mike Towers Mar. 22, 2024 780 -
What is Identity Security? Veza Mar. 29, 2024 2303 -
Key Takeaways: FBI Breach Prevention Tips Veza Apr. 10, 2024 918 -
Veza for HashiCorp Vault: Bringing least privilege to Vault and Secrets Tarun Thakur Apr. 12, 2024 386 -
Veza for Crowdstrike: Identify, triage and remediate in minutes Tarun Thakur Apr. 12, 2024 217 -
Complete Snowflake Review: Roles, Security & Access Control Veza Apr. 12, 2024 1971 -
Veza Product Updates – February 2024 Dr. Maohua Lu Apr. 15, 2024 689 -
Identity Security Posture Management Tarun Thakur Apr. 18, 2024 598 -
What is non-human identity management Veza Apr. 19, 2024 2272 -
Veza Product Updates – March 2024 Dr. Maohua Lu Apr. 19, 2024 903 -
The Imperative for Identity Security: A Call to Action for the Industry Mike Towers Apr. 24, 2024 1043 -
Identity Security Spotlight: Ransomware attack on Ascension Veza May. 17, 2024 59 -
The Veza Voice – Q1 2025 Mike Torres May. 17, 2024 2009 -
What is IGA (Identity Governance & Administration)? Veza May. 23, 2024 2286 -
Announcing The State of Access 2024 Tarun Thakur May. 22, 2024 421 -
Harnessing the Power of AI: Identity Security as a Key Enabler Mike Towers May. 23, 2024 867 -
AWS Guide: Access Governance, Security, Compliance & Roles [2024] Veza Jun. 05, 2024 2990 -
Achieving, Demonstrating, and Maintaining PCI DSS Compliance with Veza: A Game-Changer for Financial Services Companies Mike Towers Jun. 06, 2024 751 -
What is Machine Identity Management? [2024 Guide] Veza Jun. 07, 2024 2838 -
Can you tell who has access to what in Snowflake? Kale Bogdanovs Jun. 18, 2024 2050 -
Veza Product Updates – April 2024 Dr. Maohua Lu Jun. 20, 2024 1708 -
The Critical Role of Identity Security in Enabling Zero Trust Mike Towers Jul. 01, 2024 559 -
Authentication vs Authorization Veza Jul. 02, 2024 2088 -
The Principle of Least Privilege Explained Kale Bogdanovs Aug. 03, 2023 3020 -
Role mining for Snowflake: four steps toward least privilege Santosh Kumar Jul. 02, 2024 1706 -
Veza Product Updates – May 2024 Dr. Maohua Lu Jul. 08, 2024 1422 -
Intelligent Access for custom apps: getting started with Veza’s Open Authorization API Zee Khoo Jul. 11, 2024 2160 -
What is SaaS Sprawl? Veza Jul. 11, 2024 2189 -
Mitigating the UNC3944 Threat: The Power of Modern Identity Security Platforms Mike Towers Jul. 18, 2024 491 -
Join us at Black Hat USA August 3 – 8, 2024 Veza Jul. 17, 2024 177 -
The MIGHT of Veza Amy Veater Jul. 22, 2024 593 -
Veza Product Updates – June 2024 Dr. Maohua Lu Jul. 24, 2024 1281 -
Where Non-Human Identities (NHIs) and Human Identities Converge: A Comprehensive Approach to Identity Security Rich Dandliker Jul. 30, 2024 965 -
Empowering Business Initiatives with Modern Identity Security Mike Towers Aug. 02, 2024 1244 -
AI for Identity Security: My Journey, Our Perspective, and Veza’s Strategy Rich Dandliker Aug. 06, 2024 1278 -
Introducing Access AI: The Future of Identity Security Jared Blistein Aug. 06, 2024 631 -
Veza Product Updates – July 2024 Dr. Maohua Lu Aug. 19, 2024 1477 -
Securing Snowflake: A CISO’s Guide to Effective Access Control Mike Towers Aug. 22, 2024 1283 -
Identity Radicals: Identity governance in the cloud era Veza Aug. 26, 2024 1167 -
IBM’s 2024 Cost of a Data Breach Report: AI-Powered Security Lowers Costs Jared Blistein Aug. 28, 2024 1652 -
Combating Toxic Combinations Through Separation of Duties (SoD) Controls Jared Blistein Aug. 29, 2024 1365 -
Cybersecurity’s biggest challenge: The Principle of Least Privilege Kale Bogdanovs Jul. 03, 2023 3074 -
Veza’s Automated Access Revocation and Access Remediation Tom Smith Sep. 10, 2024 1000 -
Veza Product Updates – August 2024 Dr. Maohua Lu Sep. 12, 2024 1153 -
Charting a Path for the Future of Identity Security Mike Towers Sep. 23, 2024 1331 -
Identity Security Spotlight: Microsoft CISA Investigation Veza Apr. 16, 2024 87 -
Risk scoring in Identity Security Santosh Kumar Oct. 10, 2024 1517 -
Simplifying Security: The Power of Effective Access Control in Cybersecurity Mike Towers Oct. 18, 2024 1005 -
Veza Product Updates – September 2024 Dr. Maohua Lu Oct. 21, 2024 1800 -
Going Beyond Provisioning and Deprovisioning with Veza Lifecycle Management Sandler Rubin Oct. 22, 2024 1465 -
Non-Human Identity Security: A Practical Guide to Mitigating Risk Jared Blistein Oct. 29, 2024 1776 -
Operationalizing Modern Identity Security: A CISO’s Perspective on Value Creation and Sustainable Growth Mike Towers Nov. 11, 2024 1187 -
SOC 2 Compliance Requirements [2025] Veza Nov. 08, 2024 3593 -
Identity Radicals: Groundhog day in identity security Veza Nov. 21, 2024 687 -
What is lifecycle management in identity security? Veza Nov. 08, 2024 1925 -
IBM Cost of a Data Breach Report: AI Security Cost Reduction | Veza Jared Blistein Aug. 28, 2024 1652 -
Veza Product Updates – October 2024 Dr. Maohua Lu Nov. 22, 2024 1547 -
Acess AI: Introducting the Future of Identity Security | Veza Jared Blistein Aug. 06, 2024 631 -
Separation of Duties: Combating Toxic Combinations with SoD Controls | Veza Jared Blistein Aug. 29, 2024 1365 -
12 Top IGA Software Vendors [2025 Guide] Veza Nov. 08, 2024 3712 -
SOX Compliance Checklist: Your Sarbanes-Oxley Guide for 2025 Veza Dec. 02, 2024 3188 -
Introducing Veza Access Requests: Automated, Policy-Driven Access at Scale Jared Blistein Dec. 03, 2024 954 -
Posture of Access, 3 Pillars of Least Privilege | Ep 6, Identity Radicals Podcast with Adam Fletcher Veza Dec. 10, 2024 162 -
Demonstrating PCI DSS 4.0 Compliance with Veza’s Identity Security Platform Mike Towers Dec. 12, 2024 1892 -

By Matt Makai. 2021-2024.