
How Thomson Reuters’ Cloud Data Protection Unlocks Snowflake Data
As modern organizations look to innovate with agility, migrating to the cloud enables them to unlock data’s value at scale. Leading cloud data platforms...
Sign up to receive Immuta Unlocked monthly news and updates!
Get our expert articles, guides, tips, and inspiration. It's Immuta Unlocked straight to your inbox.

What Should Teams Expect from the EU’s Open Finance Initiative?
At the core of the European Union’s data strategy lies a well-structured framework composed of...

Report Finds Data Security is a Priority for Over 40% of CEOs
With data at the root of business-driving initiatives, the need to maintain data security and...

Securing AI Systems: AI Threat Knowledge Bases
Artificial Intelligence (AI) systems have recently gained significantly greater visibility and use by the general...

3 Key Components to Mastering Federated Data Mesh Governance
Like other modern advancements in data use, the data mesh concept is rooted in a...

3 Solution Patterns for Data Security Success
You’ve just adopted a data security solution – congratulations! Now what? As with any new...

Sensitive Data Discovery Tools for Modern Data Stacks
As modern data stacks become more complex, data teams need more efficient ways to manage sensitive data. When more data sources are added or...

What’s the Worst That Could Happen? A Guide to AI Risks
While generative artificial intelligence (AI), foundation models, and Large Language Models (LLMs) are often described...

Types of AI and Input Models Explained
ChatGPT is one of the fastest-growing artificial intelligence (AI)-powered apps of all time, but it...

How Instacart Streamlined Its Approach to Data Policy Authoring
As organizations continue migrating data to the cloud, they often focus on the anticipated benefits:...
Immuta Unlocked
straight to your inbox
Sign up to get expert articles, guides, tips,
and inspiration straight to your inbox.


How to Assess and Defend Against the Cyber Threat Landscape
According to the United States’ Cybersecurity & Infrastructure Security Agency (CISA), 47% of American adults...

5 Best Practices for Secure Data Sharing
In our globalized world, data sharing is table stakes for organizations that want to innovate...

Data Security Posture Management With & Without Data Classification
Data Security Posture Management Data security has become a critical concern for organizations of all...

Exploring Data Democratization: Pros, Cons, and Real-World Impact
As data is being analyzed in new ways to deliver better insights, organizations across industries...

What is Sensitive Data and How Should I Protect It?
If you’ve done any work with data, you’ve likely heard the term “sensitive data.” Data...

Data Leak Prevention for Modern Tech Stacks
When we think of threats to data, malicious hackers who are out to profit off...

Democratizing AI & More: 3 Takeaways from Databricks’ Data + AI Summit
The Databricks Data + AI Summit converged on downtown San Francisco for its 10th year,...

How to Mitigate Risk by Mastering Cloud Storage Security
The volume of cloud data is increasing at an exponential rate. But with this growth...

Elevating Data Security for Snowflake and Databricks
Over the past several years, the Immuta team has worked closely with product teams at...

Introducing Immuta’s Scalable Localized Sensitive Data Discovery
Effective sensitive data discovery (SDD) capabilities are essential for data protection, governance, and regulatory compliance....

Securing Success: Immuta is Snowflake’s 2023 Data Security Partner of the Year
It’s no exaggeration to say that virtually any contemporary organization relies on data. And as...

Inside Immuta’s Databricks Unity Catalog Integration with Row- & Column-Level Controls
Immuta continues to innovate in partnership with Databricks, and we’re excited to announce the general...

Demystifying Data Security and Privacy in the Digital Age
As data evolves, so does the threat landscape. Facing the possibilities of targeted breaches from...

Updating Australian Privacy Law: The Big Shift
On February 16, 2023, Australia’s Attorney-General’s Department (AGD) publicised its Review Report, the latest output...

How Immuta & Snowflake Unlock Zero Trust Data Security for Government & Education
In today’s tech-driven world, data security is a paramount concern for every industry. But when...

What is Data Modernization? Guiding Data into the Future
In a fast-moving field, established frameworks can often benefit from strategic updates. Think of your...

Data Mesh vs. Data Fabric: What’s the Difference?
When two different concepts sound or act alike, it can be easy to conflate them....

Bans, Breaches, and Budding Regulations: May 2023’s Key Stories
Like any fast-developing resource, the advancement of data use is subject to growing pains. As...

How Immuta’s ISO 27001/27701 Compliance is Enhancing Data Security
As the world becomes increasingly digital, data security has become a critical concern for businesses...

5 Steps for an Effective Data Breach Response
With global business and operations so heavily reliant on data collection, sharing, and analysis, data...

Databricks + Immuta: Powering the Future of the AI-Augmented Enterprise
The modern business is driven by data and AI. Decisions are no longer based on...

Why Tech Companies Should Care About Healthcare Data Breaches
Health data is one of the most valuable assets organizations in the healthcare and life...

Immuta Spotlight: Sophie Stalla-Bourdillon on Compliance Challenges with Evolving Privacy Laws
For more than four years, Sophie Stalla-Bourdillon has been the Senior Privacy Counsel and Legal...

How Does Data Classification Help Protect Data Privacy?
As data breaches and cyber attacks become more common, protecting data privacy is an increasingly...

Evolving Privacy Regulations: April 2023’s Key Stories
As new technologies continue to grow, it’s important to ensure that they are doing so...

How Snowflake & Immuta Power Healthcare Data Sharing & Analytics
From providing quality patient care and correctly diagnosing medical issues, to developing vaccines and monitoring...

Forrester TEI Study Shows How Immuta Can Drive 175% ROI Over 3 Years
Forrester’s new Total Economic Impact™ (TEI) study provides a detailed financial model based on interviews...

4 Steps to Improve Security Posture in Your Data Stack
As organizations look to migrate and optimize their data resources, cloud data platforms are continuing...

Moving from Legacy BI Extracts to Modern Data Security & Engineering
Before we can talk about modernizing from a legacy Business Intelligence (BI) extract, we need...

Immuta Enhances Starburst & Databricks Integrations, and Introduces Dynamic Query Classification
We are excited to announce Immuta’s latest product updates, including: General availability of our v2...

Building Momentum Through the Google Cloud Ready – BigQuery Designation
We are extremely excited to announce that Immuta has achieved Google Cloud Ready – BigQuery...

Immuta Spotlight: Sam Carroll on Solving Business Problems with Technical Solutions
After working at Immuta for some time, I found myself asking “What exactly is a...

The Escalating Risk of Data Breaches: March 2023’s Key Stories
As modern organizations collect customers’ data, they assume the implicit responsibility of keeping it private...

Buzzword Bracket: Comparing Trending Terms in Data Security
In the spirit of the NCAA March Madness tournament, we’ve decided to create a competitive...

Scaling Identity Management in Healthcare
The average hospital has seen a 90% turnover of its workforce in the last five...

What Are the Key APRA Data Security Standards?
Financial data is among the most sensitive information an organization can possess, yet its use...

Why Data Breach Detection is Crucial for Data Security
When a data breach occurs, time is of the essence. On one level, modern compliance...

Multi-Cloud Data Security: An Overview
Why settle for one cloud when you can have a whole buffet of platforms to...

Immuta Spotlight: Andy Olsen on Fostering a Connected Company Culture
For nearly 5 years, Andy Olsen (Senior Director of People) has played an integral role...

Immuta Enables a Seamless Data Security Integration with Snowflake & Starburst
We are excited to announce that Immuta’s latest Data Security Platform release is here, enabling...

Trending Towards a Data-Fueled Future: February 2023’s Key Stories
Data-driven leaders often push boundaries to steer their organizations towards more insight-driven, impactful futures. But...

8 Reasons to Choose Immuta’s SaaS Data Security Platform
Data is the lifeblood of any organization, and keeping it secure is of the utmost...

Immuta’s Continuous Data Security Posture Management & Snowflake Integration Automation
We are excited to announce that Immuta’s latest SaaS release is here, providing customers with...

Data Privacy Provisions and Penalties: January 2023’s Key Stories
Effective data security is standard for any modern data-driven business or agency. But as data...

Immuta Detect Provides Continuous Cloud Data Security Posture Management

Survey Reveals 5 Insights for Implementing Zero Trust
The concept of Zero Trust is not new, but it is gaining traction as data...

The Next Generation of CCPA Compliance Requirements
The 2020 elections not only saw record turnout, but also ushered in a suite of...

Immuta Enhances Databricks & Snowflake Integrations and Performance
We are excited to announce that Immuta’s latest product release is here, offering deeper native...

Data Security Reflections and Predictions: December 2022’s Key Stories
As common as data use has become in modern business and government, there is always...

Survey Reveals The 3 Most Common Data Engineering Challenges
Data teams are critical to the success of modern data-driven organizations. Made up of engineers,...

Best Practices for Data Security in Modern Cloud Platforms
As the volume of data generated, transformed, stored, and accessed has increased, digital transformation has...

Privacy Engineering’s Emerging Role in the Future of Data Security
Organizations want to be data-driven, but the question of how to do so is still...

Structuring and Empowering Data Teams: November 2022’s Key Stories
Choosing the right data security platform is an important piece of the puzzle in regards...

Immuta Spotlight: Katie Wrabel on Guiding the Next Generation of Data Security Experts
For over four years, Katie Wrabel has managed Immuta’s Documentation and Training team. Before joining...

Scaling Data Access Auditing with Immuta’s Unified Audit Model

Improved Orchestration and Deepened Collaboration from Immuta’s Latest Release
Immuta’s latest release is here, and we are excited to share the new orchestration and...

Why Data Monitoring is Key to Sensitive Data Protection
According to one 2022 report, 89% of companies claim that their organization is taking a...

Data Security, Attacks, and Costly Mistakes: October 2022’s Key Stories
Large-scale approaches to maintaining cloud data security are still relatively nascent for modern organizations. As...

Immuta Spotlight: Bob Boule on SaaS Data Security Platforms for Enterprise
As more organizations continue to shift their data to the cloud, teams are often confronted...

A Multi-Pronged Approach to Cybersecurity Risk Management Frameworks
What is a Cybersecurity Risk Management Framework? The federal government’s Risk Management Framework (RMF) offers...

3 Key Obstacles of Military Data Ops and What They Indicate
There are many lessons that I learned throughout my civilian and military careers, but one...

What is Data Governance in Healthcare and Why is it Essential?
According to the U.S. Department of Health and Human Services’ Office for Civil Rights, there...

Data Breaches, Leaks, and Fines: September 2022’s Key Stories
Without effective and thorough data security measures, organizations take on quite a bit of unnecessary...

Data Innovation Goes Global: The Immuta All Access Tour
More data is created now than ever before. According to Statista, people around the world...

Immuta Spotlight: Walter Paz on Data Weaponization
Walter Paz is the Director of Customer Success, Public Sector, for Department of Defense (DoD)...

Google BigQuery Access Control and Other Features from Immuta’s Latest Release
Immuta’s latest release is here, and we are excited to share the new features and...

Distributed Stewardship for Data Mesh Architecture
Modern enterprises rely on data to deliver insights across every line of business, from sales...

What is Data Access Management?
What is Data Access Management? Virtually all modern organizations prioritize the collection and storage of...

IDC Report Highlights Cloud Data Management Challenges
Digital-first cloud data management is the future. A survey by the International Data Corporation (IDC)...

How to Harness the Power of The Modern Data Stack
For Dave DeWalt, Founder and Managing Director of advisory firm (and Immuta investor) NightDragon, the...

Immuta and Snowflake: A Winning Partnership
“What’s really critical to Snowflake customers is that…to use the data that they have, they...

RBAC vs. ABAC for Data Access Control Use Cases
As important as data analysis is to modern businesses, enforcing the proper access control on...

The Data Privacy Regulation Roundup: What Data Teams Need to Know
When the General Data Protection Regulation (GDPR) entered into force, US privacy law was still...

Scaling Secure Data Access with Immuta & Databricks Unity Catalog
For data engineers, the effort required to wrangle access policies grows exponentially as the complexity...

Enabling Tableau Row-Level Security with Snowflake & Immuta
The ability to efficiently discover data and visualize it in meaningful ways has never been...

Pumpjack Dataworks Drives Scalable Success with Immuta
As the world’s leading fan data platform, Pumpjack Dataworks allows sports teams, venues, and even...

Better Together: Immuta and Databricks at the 2022 Data+AI Summit
“Databricks is what I think has thrust this community into a whole new stage of...

Redefining Data Sharing for Financial Services
As business continues to shift to increasingly digital environments, the aggregation and sharing of financial...

What is Policy-as-Code and Why is it Important?
In the cloud computing era, ensuring data policy is co-created with data is essential. Historically,...

Top 3 Lessons from Databricks’ 2022 Data+AI Summit
The world’s largest data and AI conference took over downtown San Francisco the last week...

3 Tips for Implementing a Future-Ready Data Security Platform
As data storage and analysis continue to migrate from on-premises to the cloud, the market...

Simplify Data Access for Starburst’s Federated Query Engine and Data Mesh
Immuta + Starburst Integration As market demand for data mesh has grown, the need for...

Immuta Introduces New Capabilities and Integrations to Enhance Security for Cloud Data
The data security and privacy space continues to evolve to keep pace with the constantly...

How to Create a Data Governance Framework
By 2025, experts anticipate that there will be around 175 zettabytes of data in the...

What Types of Data Controls Are There?
Data controls refer to the tactics, policies, and procedures that organizations use to meet their...

Data Masking vs. Tokenization: What’s the Difference?
Data protection measures are only as strong as their ability to outsmart increasingly advanced technology...

How to Achieve Data Security Governance and Compliance
As data further cements itself as an essential resource for modern businesses, more steps must...

How Immuta Simplifies Sensitive Data Tagging for Snowflake Data Lineage
Data is essential to modern business, thanks to its ability to improve insights and drive...

Resilient, Agile, and Future-Ready: A Roundtable on the Modern Data Stack
The modern data stack bears the immense responsibility of storing, protecting, analyzing, and operationalizing a...

How to Comply with the Zero Trust Executive Order
A year after the White House released its Executive Order (EO) on Improving the Nation’s...

Immuta’s $100M Series E Funding and Why We’re the Leader in Secure Data Access
I’m excited to announce Immuta’s $100M Series E funding, bringing our total funding to $267M....

How to Mask Sensitive Financial Data with Databricks and Immuta
As data moves among the storage, compute, and analysis layers of a data stack, there...

SQL-Based Enforcement of k-Anonymization
What Is k-Anonymization? Privacy preserving analytics attempt to enable the exploitation of data sets that...

How to Enable SaaS Data Governance on Snowflake Partner Connect
Have you wondered how to protect your Snowflake data warehouse with column-, row-, and cell-level...

What Is Purpose-Based Access Control (PBAC)?
When it comes to making decisions, context is essential. Imagine your neighbor asks for a...

What Are Data Masking Best Practices?
What Is Data Masking? Before diving into best practices for data masking, it’s integral to...

The Top 5 Data Anonymization Best Practices
The data anonymization landscape is broad and constantly evolving as new technology comes online, regulations...

What Are the Top Data Anonymization Techniques?
The explosion of organizations that collect and store data for analytics use has led to...

What is Data Tokenization and Why is it Important?
What Is Data Tokenization? Why Is Data Tokenization Important for Data Security? When Should I...

How to Define a Data Masking Standard for Compliant Analytics
What Are Common Data Masking Techniques? How Should I Define a Data Masking Standard for...

What Are the Most Common Types of Data Masking?
What Are the Most Common Types of Data Masking? Data masking is a type of...

What Is Data Masking?
What Is Data Masking? Why Do I Need Data Masking? What Are Some Data Masking...

What is Data Anonymization?
What Is Data Anonymization? Data anonymization is the process of transforming information by removing or...

How Latch Enables Secure Self-Service Data Analytics with Immuta & Snowflake
A decade ago, having a camera on your doorbell or being able to unlock your...

What is a Data Mesh Architecture and How Does it Work?
Governance and security are hot topics in data mesh, as evidenced by the recent webinar I co-presented...

Simplifying Snowflake Security with Alation & Immuta
This blog was co-authored with Deepak Nelli, Director of Sales Engineering at Alation. The modern...

What Is Policy-Based Access Control?
In daily conversation, we often use umbrella terms to group things together. If someone tells...

Data Leaders’ Top 4 Enterprise Data Security Challenges
There’s no disputing the importance of data in driving cutting edge insights and business outcomes....

Protect Sensitive Data with Key Privacy Enhancing Techniques
According to the Identity Theft Resource Center, there were 1,862 data breaches in 2021, exceeding the...

5 Steps to Make Data a Strategic Asset for Geospatial Intelligence
In 2021, the National Geospatial-Intelligence Agency (NGA) published its new data strategy, which seeks to...

The Costs of Cloud-Based Access Control: DIY vs. Automated
Organizations are shifting from on-premises data storage to the cloud, with the goal of profiting...

How To Easily Adapt Data Access Management for Table Grants
Attribute-based access control (ABAC) grants or restricts access to data using context-based decisions based on...

Immuta’s Latest Updates Unlock Agility and Improve Accessibility
It’s been another busy quarter for Immuta’s engineering and product teams as they continue to...

Data Buzzwords: 15 Trending Terms to Know
The world of data is full of interesting language, complex terms, and more acronyms than...

5 Steps to Automating & Protecting All Your Data
Successful data platform teams and championship sports teams may have several commonalities, like strong baseline...

SaaS Data Security: Faster, More Flexible Data Access Control
As cloud adoption accelerates, SaaS-based products have also exploded to fill the agility, scalability, and...

What is ABAC? Attribute-Based Access Control 101
There’s a lot of confusion in the market about attribute-based access control (ABAC) and what it actually...

What Is Multi-Tenancy? An Overview for Cloud Computing
As cloud infrastructures, SaaS deployment models, and data sharing become increasingly prevalent, multi-tenant architectures help ensure cloud-based...

The Myth of Vendor Lock-In: Building vs. Buying in the Federal Market
Recently, across the social media spectrum there has been an uptick in government program leaders,...

What is Data Obfuscation? Everything You Should Know
As data use has become ubiquitous in recent years, data breaches have followed suit. In...

Data Localization: A Complete Overview
Scientists predict that by 2025, the world will produce a staggering 463 exabytes of data...

3 Best Practices for Maximizing Data Management Efficiency
In 2020, global spending on cloud data services reached $312 billion. In 2022, Gartner estimates...

How to Integrate Identity and Access Management Across Cloud Platforms
Identity and access management (IAM) systems have become essential components of organizational workflows, allowing users...

What’s New in Immuta to Scale Access to Modern Cloud Data
2021 saw the continued adoption of cloud data platforms and solutions. Yet, the same challenges...

Why Automated Policy Enforcement is the Backbone of Modern DataOps & Self-Service Analytics
Data is a key commodity that agencies can leverage for strategic advantage — if they...

3 Predictions for Data Security in 2022
While the pandemic’s effects are still being felt, organizations have had a chance to reflect...

How to Implement Immuta with Collibra
Immuta is the universal cloud data access control platform that gives data engineering and operations...

Immuta SaaS Now Generally Available to Control Access to Modern Data Stacks
To deliver on the need to manage and secure software across modern data stacks, Immuta...

Industry Leaders Share Perspectives on the State of Cloud Adoption
With the world of data analytics and governance constantly changing, it is critical for organizations...
Snowflake and Immuta Pair Up to Provide an Industry-Leading Data Governance Solution
For Data Engineers responsible for delivering data to consumers, the effort needed to wrangle policies...

Automating Snowflake Data Governance for Cloud Data
Organizations are accelerating adoption of modern data stacks to empower growing numbers of internal and...

Why a Data Management Framework is Essential
Is it possible to manage a successful business or organization if you’re not successfully managing...

2022 State of Data Engineering Survey Highlights Biggest Cloud Data Challenges
The data landscape is in a constant state of evolution, with new technologies and practices...

What is CMMC? Cybersecurity Maturity Model Certification Overview
If you’ve heard the term CMMC being used more frequently, you’re not alone. This upcoming...

5 Steps for Building a GDPR-Compliant Data Strategy
A modern analytics environment is typically built to reduce time to data, leaving compliance as...

Understanding Differential Privacy
Collecting and analyzing aggregated data is essential in today’s connected world, but are you doing...

Understanding Differential Data Privacy
In today’s day and age, we’re accustomed to technological advances and capabilities being uncovered all...

GigaOm Report Positions Immuta as the Leader in Data Access Control
Data access control and governance are central tenets of a strong cloud data strategy. As...

Announcing SOC 2 Type 2 Attestation at Immuta
Reinforcing our commitment to data protection and security At Immuta, the security of our customers’...

Modernizing From an RBAC to ABAC Model: Is It Hard?
The good news is no. The better news is you are already 90% of the...

Cloud Data Security: A Complete Overview
With cloud data platforms becoming the most common way for companies to store and access...

What Is a Data Clean Room?
As data has become one of the most prized resources for companies around the world,...

The Secrets of Highly Regulated Data-Drive Organizations
GDPR, CCPA, and PIPEDA are just a few examples of the growing number of strict...

Data Privacy Technology Is No Longer Optional – Here’s Why
The Future of Data Privacy Regulation The average person doesn’t go through life wondering which...

Gartner Hype Cycle for Privacy, 2021
News of data leaks and breaches seems to be increasingly common. While this trend is...

New in 2021.3: Performance & Scale for Secure Workloads in Databricks & More
At Immuta, we have a culture of innovation and continuous improvement. We listen to our...

How the Executive Order on Zero Trust Improves the Nation’s Cybersecurity
It is something along the lines of common wisdom to describe cybersecurity as the biggest...

The Top 3 Data Supply Chain Challenges – And Their Business Impacts
Increasing demand for data and its evolving uses – particularly personal and sensitive data –...

What Is a Data Mesh?
A data mesh is an increasingly popular data architecture framework that moves away from the...

What is a Data Supply Chain?
We’re all familiar with supply chains in the realm of manufacturing. Well, the same concept...

What is Data Orchestration?
Data orchestration is the process of bringing together data from various storage locations, combining it...

The Evolution of the Modern Cloud Data Warehouse
Someone starting a small business – think custom t-shirts, candlemaking, etc. – could probably operate...

Secure Access to Databricks Without Compromising Performance & Scalability
You need scalability and performance Scalability and performance go hand-in-hand. If you have great performance,...

What is Metadata Management?
Metadata management is the collection of policies, processes, and software/hardware platforms used to manage and...

Data Intelligence vs. Data Analytics
The terms ‘data intelligence’ and ‘data analytics’ may as well be enshrined in marble for...

Immuta vs. Ranger: Research Comparison Finds Immuta’s ABAC Reduces Policy Burden by 75x
The role-based access control versus attribute-based access control debate has been going on for decades....

The Top 5 Barriers to Data Sharing and How to Overcome Them
Technology has made our world increasingly interconnected and interdependent, and as a result, the need...

Data Sharing Is a Necessity to Accelerate Digital Business
According to Gartner’s report, “By 2024, most organizations will attempt trust-based data sharing programs, but...

Your Guide to Deploying Data Access Control Using Immuta SaaS & Self-Managed
Organizations are realizing the value of data lakehouse architectures and, as a result, adoption rates...

The Complete Guide to Data Security Compliance Laws and Regulations
Compliance regulations in the data security space are constantly changing and evolving, with more new...

What Is Data Redaction?
There’s an old adage that all press is good press, but one kind of attention...

Why You Need a Data Audit Trail
Data leaks are everywhere in the news. Is your company safe and readily able to...

Data Owners: Privacy is YOUR Problem
Data has been called “the new gold” for its ability to transform and automate business...

How Policy as Code Automates Fine-Grained Access Controls
Writing or modifying scripts, managing templates, or creating policy for cloud data access control platforms...

Maximize Financial Data Security with Immuta
For more than 160 years, Credit Suisse has been providing customers with best-in-class wealth management,...

Data Masking Tools and Solutions
Data masking is one of the most important tasks in data governance. It may seem...

SQL Is Your Data Mesh API
What Is a Data Mesh? As Zhamak Dehghani describes in her original article, “How to...

What is Data Generalization? A Complete Overview
Data generalization is the process of creating a more broad categorization of data in a...

Data Lake Governance: What Is It and Do You Need It?
Data lakes have become essential tools for businesses in the era of Big Data. But...

Layers of Data Policy Enforcement in Cloud Ecosystems
Organizations expanding their cloud data ecosystems (multi- and cross-cloud services for building data products) are...

Our 3 Key Takeaways from Databricks’ Data + AI Summit
Databricks’ Data + AI Summit was held virtually over the span of just one week,...

Enabling Third Party Sharing with Databricks Data Sharing
Would you like to monetize your internal data by sharing it externally with third parties?...

How Immuta Addresses the Department of Defense Data Strategy Goals
Immuta was born out of the Intelligence Community in 2015 to help organizations solve the...

Immuta’s $90M in Series D Funding & Our Vision for Cloud Data Access Control
When we founded Immuta in 2015, the data landscape barely resembled what it is today....

Immuta’s Universal Data Access Control for Lakehouse Architectures
As companies started moving data to the cloud and separating compute and storage for added...

Why Immuta is one of CRN’s Coolest Data Management Vendors
We are thrilled to announce Immuta’s recognition as one of the coolest data management and...

What is Data De-identification and Why is It Important?
Data de-identification is a form of dynamic data masking that refers to breaking the link between data...

How Immuta Fosters an Inclusive and Diverse Workplace
Inclusion and diversity are universally considered desirable characteristics for modern workplaces. At Immuta, our commitment...

How AstrumU Maximizes Data Privacy & Utility with Immuta & Databricks
Kaj Pedersen, Chief Technical Officer at AstrumU, joined Immuta and Databricks at a recent Amazon...

Why Clarifying De-Identification Concepts is Key to Sufficient Data Protection
Data protection law emerged in the 1970’s in Europe as a means to protect against...

Everything You Need to Know About K-Anonymity
Businesses and organizations hold more personal data now than ever before. In general, this data...

3 Automated Privacy Controls in Databricks Using Immuta
The data your company collects is one of its most valuable assets. And yet, at...

Taking Policies the Last Mile with Looker & Immuta
“Don’t Repeat Yourself” is a powerful principle for software engineers and data professionals. But staying...

How To: Reporting & Auditing in Databricks Using Immuta
As a data engineer or architect, your organization’s security and compliance teams look to you...

This Is Why Your Data Governance Strategy Is Failing
The first step of goal achievement is goal setting, and the first rule of goal...

The State of Data & Analytics Governance Is Worse Than You Think
Leadership teams are quick to write off data governance programs – after all, why prioritize...

Why Forbes Recognized Immuta as a Top American Startup Employer
We are excited to announce Forbes has recognized Immuta as one of America’s Best Startup...
What It Means To Be A Snowflake Premier Partner
Whether your organization has 50 people or 50,000, one common denominator remains: Data analytics is...

Separating Value & Governance Transformations with dbt & Immuta
On Immuta’s data team, we put metadata at the center of our access strategy from...

What is Fine-Grained Access Control? (And Why It’s So Important)
One of the most traditional methods of determining who can and cannot access certain data...

Immuta Introduces Support for Databricks SQL Analytics & Google Cloud
Immuta and Databricks have deepened our strategic partnership and augmented our native product integration by announcing Immuta’s...

How to Enforce Policies on Data Platforms with Alation & Immuta
Immuta is the modern data access control and security solution that gives data engineering and...

5 Tools for Secure Data Analytics in Okta
More organizations than ever are leveraging the power of multiple cloud data platforms for business-driving...

Dogfooding Data Access Control
Data access control: quixotic enterprise initiative, or the top priority of a startup’s first data...

5 Important Things to Look For in a Data Governance Tool
A data governance tool can help your organization automate data governance at scale, increase data...

How to: Automating Privacy Control in Databricks Using Immuta
“Over the past few years, data privacy has evolved from ‘nice to have’ to a...

How The Center for New Data Saved $1 Million with Immuta
By the time COVID-19 was classified as a pandemic, it was already spreading like wildfire....

What is Differential Privacy? A Guide for Data Teams
In today’s day and age, we’re accustomed to technological advances and capabilities being uncovered all...

The Key to Modernizing Data Governance Programs
“Data initiatives never live up to their full potential without appropriate governance behind [them].” This...

How to Unlock Successful, Scalable GDPR Compliance
The General Data Protection Regulation (GDPR) is omnipresent: It applies to every person or entity...

How To: Access Controls in Databricks Using Immuta
The pros and cons of role-based access control (RBAC) and attribute-based access control (ABAC) have...

What is Data Governance? Everything You Need to Know
Organizations are increasingly recognizing their data as a valuable asset that can significantly shape and...

8 Signs You Need Data Access Control for Databricks
Imagine this — You’re at the starting line of a road race. The gun goes...

Immuta’s Latest Release: Unlocking the Power of the Cloud Data Ecosystem
As data teams modernize their data stacks for the cloud and adopt multiple cloud data...

How to Implement Databricks Access Control with R and Scala
Databricks table ACLs let data engineers programmatically grant and revoke access to tables. With table...

Reflecting on a Successful First Year with Databricks
One year ago, Immuta and Databricks announced an expanded partnership with a promise to empower...

A 10-Step Guide for Data Security in Cloud Computing
With an industry-wide 92% cloud adoption rate, well over half of organizations using multiple public clouds...

Immuta & Starburst Trino: Powering Faster, Safer Analytics & Data Science
Access to sensitive data is more critical to data analytics and data science than ever...

3 Signs You Need a Data Engineer
Data engineers are among the most important resources an organization can have, and yet according...

Data Engineering is Critical to Driving Data and Analytics Success
Organizations are increasingly relying on data analytics to mine insights that drive business results. Data-driven...

Immuta’s Data Team Shares 8 Great Resources for Data Engineers
Many people fall into data engineering by accident. Software engineers may find that they enjoy...

Role-Based Access Control vs. Attribute-Based Access Control
The terms role-based access control and attribute-based access control are well known, but not necessarily well understood — or...

How to Avoid the Most Common Cloud Migration Challenges
Cloud provider capabilities are evolving faster than ever, and enterprises are taking notice. With all...

What is a Data Catalog? 5 Features of a Modern Data Catalog
Imagine going to a library in search of a specific book with a piece of...

4 Reasons to Start Your Cloud Migration Process with Data Security
The vast majority of organizations now utilize the cloud in some form or another, yet...

A Low-Risk, Low-Cost Cloud Migration Roadmap
Lifting and shifting data science operations to the cloud can be expensive and risky. From...

Enforcing 23 NYCRR 500: The Buck Stops with the CISO
In 2017, the New York Department of Financial Services (NYDFS) passed regulation 23 NYCRR 500,...

How k-Anonymization is Making Health Data More Secure
Reflecting on the impact that the COVID-19 pandemic has had on daily life, the importance...

A Call for a Risk-Based Assessment of Anonymization Approaches
Why it’s time to reexamine the binary dichotomy between personal and aggregate data, and what...

4 Ways a Data Science Company Enables Research at Scale
Scalability is critical to driving accurate, applicable researched-based predictions and insights. But without the proper...

Myth Busting Legal Compliance Automation in Data Analytics
Let’s face it: compliance can be tricky when it comes to data science and analytics....

Data-as-a-Service with Databricks Enterprise Cloud Service
The new Databricks Enterprise Cloud Service architecture provides powerful network security capabilities, however, a lesser...

Secure Data Collaboration, Privacy, and Compliance for Databricks
Databricks shops are expanding their analytical use cases, and, in the process, bringing more sensitive...

Sneak Preview: Immuta at Spark+AI Summit 2020
Recently on the blog, we wrote about how the deep business partnership between Immuta and...

Databricks and Immuta: Data Analytics with Automated Governance
Immuta and Databricks have formed a deep business partnership and integrated their market-leading analytics and...

Using Adaptive Data Governance to Succeed in Digital Business
Data and analytics leaders’ endeavors often do not pass through a centralized organization or figure....

Security Meets Privacy… in Databricks
Security is always a driving force, particularly for organizations making the move from on-premises Hadoop...

Automate HIPAA De-identification Methods on Amazon RDS
Data engineers and product managers are often responsible for implementing various controls and audit capabilities...

Security and Privacy Layers in Snowflake for Highly Sensitive Data
“Over the past few years, data privacy has evolved from ‘nice to have’ to a...

New Release: Native Snowflake Policy Enforcement, Dynamic k-anonymization, External Masking
As I prepared to write this blog about the value provided by our latest Immuta...

A Lawyer and A Data Scientist Start A Law Firm
At the end of my first week at Immuta, all the way back in 2016,...

A Lawyer and A Data Scientist Walk Into A Bar
Today marks the end of my first week at Immuta, and I thought I’d take...

Immuta Named One of World’s 50 Most Innovative Companies by Fast Company
Today, Immuta was named to Fast Company’s annual list of the World’s 50 Most Innovative...

Why Provisioned Access is the Key to the Right to be Forgotten
Since the Court of Justice of the European Union (EU) decided the Google Spain case...

Identity & Access Control Management for Public Sector
Immuta was founded in 2015 in response to the U.S. Intelligence Community’s (IC’s) complex and...

Why a Data Privacy Compliance Journey Should Start with Privacy by Design
Global interest in privacy has led to a recent explosion in privacy-centric legislation. Consequently, organizations...

How Policy Leaders Can Democratize Data Ethics
Now, even Facebook’s Mark Zuckerberg is calling for GDPR-like national data regulations. His goals are laudable. He...

7 Legal Principles to Stay Ahead of the Regulatory Curve
Just this year, countries that constitute 50% of the world’s GDP are considering or enforcing...

Differential Privacy: A Sound Way to Protect Private Data
Striking the privacy-utility balance is the central challenge to organizations handling sensitive data. Assessing the...

An Ongoing Challenge for AI/ML in the Traditional Enterprise: Getting Data to the Cloud
Artificial Intelligence (AI) and Machine Learning (ML) are among the “buzziest” of the buzz words...

Data Access Patterns: Start From Scratch; Rinse, Repeat
This is part IV of our “Data Governance Anti-Patterns Series.” You can find part III here....

Data Governance Anti-Patterns: Stop Conflating Who, Why, and What
(This Is Part II of Our “Data Governance Anti-Patterns Series”, Part I Can Be Found Here)....

A Former Chief Operational Risk Officer for a Global Fortune 300 Bank on Why He Joined Immuta
“How does working for a software start-up compare to working for a massive financial institution?”...

Create Instant, Customizable Reports on Data Activities with Immuta
Reports on data processing activities are crucial for compliance. Describing processing activities – like what...

5 Ways Immuta Promotes Ethical Data Science & Customer Trust
Amazon’s Alexa. Apple’s Siri. Bank of America’s Erica. These are all examples of marquee “digital...

Data Governance Anti-Patterns: The Copy & Paste Data Sharing Method
(This Is Part III of Our “Data Governance Anti-Patterns Series,” Part II Can Be Found...

Differentiating Data Security in the GDPR from Privacy
The European Union’s General Data Protection Regulation — one of the most forward-leaning privacy regulations...

Why a Professor in Information Technology Law & Data Governance Joined Immuta
I joined the Immuta team last Monday and, since then, have been asked several times:...

Homomorphic Encryption Alone Is Security, Not Privacy
I’ve seen written many times that “Privacy can be improved with techniques like differential privacy...

Spark Is Now In Immuta!
Announcement Immuta is happy to announce our 2.1 release which includes native SparkSQL policy enforcement....

What’s A Legal Engineer?
Just over a year ago, I wrote a blogpost titled “A Lawyer and A Data...

Stop Reinventing the Wheel: The Case for Unified Data Policies
(This Is Part I of Our “Data Governance Anti-Patterns Series”, Part II Can Be Found Here). Anti-patterns...

Q&A with Dataiku CEO Florian Douetteau about Data Governance and Machine Learning
Enterprises have a wealth of data at their fingertips and are eager to accelerate data...

Data Privacy & Data Science: The Next Generation of Data Experimentation
Collection of consumer data is mainstream and global. The generally accepted premise of the big...