Blog

Featured

Sign up to receive Immuta Unlocked monthly news and updates!

Get our expert articles, guides, tips, and inspiration. It's Immuta Unlocked straight to your inbox.

March 14, 2024
Data Leaders’ Top 4 Security Trends for 2024

It’s easy to talk about trends in absolutes. “This new development will affect jobs across...

March 6, 2024
Enhancing Databricks Unity Catalog for Evolving Data & AI Governance

In the 2024 State of Data Security Report, a vast majority (88%) of data professionals...

February 28, 2024
Discover Frameworks: Bridging the Gap Between Regulation & Application

“What data do we have?” Data’s entire life cycle – from collection, to analysis, to...

January 30, 2024
Immuta & Snowflake Horizon: Integrated Solutions for Data Governance Use Cases

For organizations like Thomson Reuters and Instacart, which rely on Snowflake to execute advanced analytics...

January 30, 2024
How to Make Data Mesh a Reality: An Implementation Roadmap

We recently conducted an intriguing webinar exploring the data mesh concept, and how it’s transforming...

Thought Leadership

Insights and perspectives from Immuta's leadership team, directly to you.

Matthew Carroll
Matthew Carroll
CEO

Topics of interest: Access Controls, Customers, and Data Privacy

Steve Touw
Steve Touw
CTO

Topics of interest: ABAC, Data Mesh, and How-to

Sophie Stalla-Bourdillon
Sophie Stalla-Bourdillon
Legal Engineer

Topics of interest: Data Anonymization, Data Localization, and Privacy

Richard Geering
Richard Geering
SVP, Strategic Initiatives

Topics of interest: Data Monitoring, Data Supply Chain, and Regulatory

Featured
January 30, 2024
How Immuta’s Data Source List Improves Visibility & Data Use

New Year’s is a time for change, for bettering oneself, for taking that first step...

January 17, 2024
3 Emerging Data Security Laws and What They Mean for You

The past few months have been particularly hectic for lawmakers across the European Union (EU)....

January 16, 2024
Unlocking Education Data Analytics for the Future of Work

It goes without saying that employee engagement is a key indicator of organizational performance –...

Immuta Unlocked
straight to your inbox

Sign up to get expert articles, guides, tips,
and inspiration straight to your inbox.

Subscribe
Unlocked Newsletter
January 11, 2024
The Intersection of Data Security and IAM

As more capabilities become automated as part of cloud services, we find that our customers...

December 19, 2023
How Snowflake, phData, and Immuta Approach Data Mesh Challenges

Moving from concept to execution can be a complicated process – especially with data mesh...

December 8, 2023
What Is the EU-US Data Privacy Framework & How Should You Plan?

The General Data Protection Regulation (GDPR) is one of the most wide-reaching and stringent data...

November 28, 2023
Enabling Cloud Infrastructure Security for Storage & Compute

Pushes toward self-service data use, advancements in AI, and the demand for real time, granular...

November 28, 2023
The “One Policy” Approach to Policy-Based Access Management

In his Lord of the Rings series, J.R.R. Tolkien writes of 19 rings of power...

November 27, 2023
How Immuta’s Native Integration Supports Amazon S3 Security

Over the past year, we’ve witnessed an unprecedented surge in the development and democratization of...

November 14, 2023
Acceptable Use Policy for Generative AI: Where to Start? 

Generative artificial intelligence (AI) are prediction algorithms that can be leveraged to create any type...

November 9, 2023
4 Simple Steps to Mature Your Data Security Strategy

In today’s digital landscape, safeguarding your data is more important than ever. Whether you’re a...

October 31, 2023
Social vs. Technical: Leaders Weigh in on Data Mesh Challenges

Immuta CTO and Co-Founder Steve Touw sat down with Paul Rankin, Head of Data Management...

October 30, 2023
Immuta Discover Provides Accurate & Actionable Metadata for Data Security

Data is more critical than ever. Large Language Models (LLMs) and Generative AI are taking...

October 19, 2023
SQL: The Forgotten API

Data mesh has become a hot topic as organizations look to foster self-service analytics to...

October 19, 2023
Is Data Mesh Feasible for Highly Regulated Industries?

The concept of the data mesh architecture is widely recognized and often sought after by...

September 20, 2023
What Should Teams Expect from the EU’s Open Finance Initiative?

At the core of the European Union’s data strategy lies a well-structured framework composed of...

September 11, 2023
Report Finds Data Security is a Priority for Over 40% of CEOs

With data at the root of business-driving initiatives, the need to maintain data security and...

September 1, 2023
Securing AI Systems: AI Threat Knowledge Bases

Artificial Intelligence (AI) systems have recently gained significantly greater visibility and use by the general...

August 29, 2023
3 Key Components to Mastering Federated Data Mesh Governance

Like other modern advancements in data use, the data mesh concept is rooted in a...

August 24, 2023
3 Solution Patterns for Data Security Success

You’ve just adopted a data security solution – congratulations! Now what? As with any new...

August 16, 2023
What’s the Worst That Could Happen? A Guide to AI Risks

While generative artificial intelligence (AI), foundation models, and Large Language Models (LLMs) are often described...

August 16, 2023
Types of AI and Input Models Explained

ChatGPT is one of the fastest-growing artificial intelligence (AI)-powered apps of all time, but it...

August 15, 2023
How Instacart Streamlined Its Approach to Data Policy Authoring

As organizations continue migrating data to the cloud, they often focus on the anticipated benefits:...

July 31, 2023
How to Assess and Defend Against the Cyber Threat Landscape

According to the United States’ Cybersecurity & Infrastructure Security Agency (CISA), 47% of American adults...

July 28, 2023
5 Best Practices for Secure Data Sharing

In our globalized world, data sharing is table stakes for organizations that want to innovate...

Understanding Differential Data Privacy
July 21, 2023
Data Security Posture Management With & Without Data Classification

Data Security Posture Management Data security has become a critical concern for organizations of all...

July 14, 2023
Exploring Data Democratization: Pros, Cons, and Real-World Impact

As data is being analyzed in new ways to deliver better insights, organizations across industries...

July 11, 2023
What is Sensitive Data and How Should I Protect It?

If you’ve done any work with data, you’ve likely heard the term “sensitive data.” Data...

July 7, 2023
Data Leak Prevention for Modern Tech Stacks

When we think of threats to data, malicious hackers who are out to profit off...

Databricks + Immuta
July 6, 2023
Democratizing AI & More: 3 Takeaways from Databricks’ Data + AI Summit

The Databricks Data + AI Summit converged on downtown San Francisco for its 10th year,...

July 3, 2023
How to Mitigate Risk by Mastering Cloud Storage Security

The volume of cloud data is increasing at an exponential rate. But with this growth...

June 28, 2023
Elevating Data Security for Snowflake and Databricks

Over the past several years, the Immuta team has worked closely with product teams at...

June 27, 2023
Introducing Immuta’s Scalable Localized Sensitive Data Discovery

Effective sensitive data discovery (SDD) capabilities are essential for data protection, governance, and regulatory compliance....

June 27, 2023
Securing Success: Immuta is Snowflake’s 2023 Data Security Partner of the Year

It’s no exaggeration to say that virtually any contemporary organization relies on data. And as...

Databricks and Immuta
June 26, 2023
Inside Immuta’s Databricks Unity Catalog Integration with Row- & Column-Level Controls 

Immuta continues to innovate in partnership with Databricks, and we’re excited to announce the general...

June 20, 2023
Demystifying Data Security and Privacy in the Digital Age

As data evolves, so does the threat landscape. Facing the possibilities of targeted breaches from...

June 14, 2023
Updating Australian Privacy Law: The Big Shift

On February 16, 2023, Australia’s Attorney-General’s Department (AGD) publicised its Review Report, the latest output...

June 7, 2023
How Immuta & Snowflake Unlock Zero Trust Data Security for Government & Education

In today’s tech-driven world, data security is a paramount concern for every industry. But when...

June 6, 2023
What is Data Modernization? Guiding Data into the Future

In a fast-moving field, established frameworks can often benefit from strategic updates. Think of your...

May 31, 2023
Data Mesh vs. Data Fabric: What’s the Difference?

When two different concepts sound or act alike, it can be easy to conflate them....

May 24, 2023
Bans, Breaches, and Budding Regulations: May 2023’s Key Stories

Like any fast-developing resource, the advancement of data use is subject to growing pains. As...

May 22, 2023
How Immuta’s ISO 27001/27701 Compliance is Enhancing Data Security

As the world becomes increasingly digital, data security has become a critical concern for businesses...

May 16, 2023
5 Steps for an Effective Data Breach Response

With global business and operations so heavily reliant on data collection, sharing, and analysis, data...

Databricks + Immuta
May 4, 2023
Databricks + Immuta: Powering the Future of the AI-Augmented Enterprise

The modern business is driven by data and AI. Decisions are no longer based on...

May 3, 2023
Why Tech Companies Should Care About Healthcare Data Breaches

Health data is one of the most valuable assets organizations in the healthcare and life...

May 2, 2023
Immuta Spotlight: Sophie Stalla-Bourdillon on Compliance Challenges with Evolving Privacy Laws

For more than four years, Sophie Stalla-Bourdillon has been the Senior Privacy Counsel and Legal...

April 28, 2023
How Does Data Classification Help Protect Data Privacy?

As data breaches and cyber attacks become more common, protecting data privacy is an increasingly...

April 26, 2023
Evolving Privacy Regulations: April 2023’s Key Stories

As new technologies continue to grow, it’s important to ensure that they are doing so...

April 18, 2023
How Snowflake & Immuta Power Healthcare Data Sharing & Analytics

From providing quality patient care and correctly diagnosing medical issues, to developing vaccines and monitoring...

April 18, 2023
Forrester TEI Study Shows How Immuta Can Drive 175% ROI Over 3 Years

Forrester’s new Total Economic Impact™ (TEI) study provides a detailed financial model based on interviews...

April 13, 2023
4 Steps to Improve Security Posture in Your Data Stack

As organizations look to migrate and optimize their data resources, cloud data platforms are continuing...

April 5, 2023
Moving from Legacy BI Extracts to Modern Data Security & Engineering

Before we can talk about modernizing from a legacy Business Intelligence (BI) extract, we need...

March 31, 2023
Immuta Enhances Starburst & Databricks Integrations, and Introduces Dynamic Query Classification 

We are excited to announce Immuta’s latest product updates, including: General availability of our v2...

March 30, 2023
Building Momentum Through the Google Cloud Ready – BigQuery Designation 

We are extremely excited to announce that Immuta has achieved Google Cloud Ready – BigQuery...

March 30, 2023
Immuta Spotlight: Sam Carroll on Solving Business Problems with Technical Solutions

After working at Immuta for some time, I found myself asking “What exactly is a...

March 29, 2023
The Escalating Risk of Data Breaches: March 2023’s Key Stories

As modern organizations collect customers’ data, they assume the implicit responsibility of keeping it private...

March 29, 2023
Buzzword Bracket: Comparing Trending Terms in Data Security

In the spirit of the NCAA March Madness tournament, we’ve decided to create a competitive...

March 28, 2023
Scaling Identity Management in Healthcare

The average hospital has seen a 90% turnover of its workforce in the last five...

March 24, 2023
What Are the Key APRA Data Security Standards?

Financial data is among the most sensitive information an organization can possess, yet its use...

March 17, 2023
Why Data Breach Detection is Crucial for Data Security

When a data breach occurs, time is of the essence. On one level, modern compliance...

March 6, 2023
Multi-Cloud Data Security: An Overview

Why settle for one cloud when you can have a whole buffet of platforms to...

March 1, 2023
Immuta Spotlight: Andy Olsen on Fostering a Connected Company Culture

For nearly 5 years, Andy Olsen (Senior Director of People) has played an integral role...

February 28, 2023
Immuta Enables a Seamless Data Security Integration with Snowflake & Starburst

We are excited to announce that Immuta’s latest Data Security Platform release is here, enabling...

February 22, 2023
Trending Towards a Data-Fueled Future: February 2023’s Key Stories

Data-driven leaders often push boundaries to steer their organizations towards more insight-driven, impactful futures. But...

Understanding Differential Data Privacy
February 13, 2023
8 Reasons to Choose Immuta’s SaaS Data Security Platform

Data is the lifeblood of any organization, and keeping it secure is of the utmost...

January 26, 2023
Immuta’s Continuous Data Security Posture Management & Snowflake Integration Automation 

We are excited to announce that Immuta’s latest SaaS release is here, providing customers with...

January 26, 2023
Data Privacy Provisions and Penalties: January 2023’s Key Stories

Effective data security is standard for any modern data-driven business or agency. But as data...

Immuta Detect Risk Scoring
January 18, 2023
Immuta Detect Provides Continuous Cloud Data Security Posture Management
January 17, 2023
Survey Reveals 5 Insights for Implementing Zero Trust

The concept of Zero Trust is not new, but it is gaining traction as data...

December 22, 2022
The Next Generation of CCPA Compliance Requirements

The 2020 elections not only saw record turnout, but also ushered in a suite of...

December 20, 2022
Immuta Enhances Databricks & Snowflake Integrations and Performance

We are excited to announce that Immuta’s latest product release is here, offering deeper native...

December 19, 2022
Data Security Reflections and Predictions: December 2022’s Key Stories

As common as data use has become in modern business and government, there is always...

December 12, 2022
Survey Reveals The 3 Most Common Data Engineering Challenges

Data teams are critical to the success of modern data-driven organizations. Made up of engineers,...

November 30, 2022
Best Practices for Data Security in Modern Cloud Platforms

As the volume of data generated, transformed, stored, and accessed has increased, digital transformation has...

November 29, 2022
Privacy Engineering’s Emerging Role in the Future of Data Security

Organizations want to be data-driven, but figuring out how to do so is often far...

November 22, 2022
Structuring and Empowering Data Teams: November 2022’s Key Stories

Choosing the right data security platform is an important piece of the puzzle in regards...

Katie Wrabel
November 17, 2022
Immuta Spotlight: Katie Wrabel on Guiding the Next Generation of Data Security Experts

For over four years, Katie Wrabel has managed Immuta’s Documentation and Training team. Before joining...

Understanding Differential Data Privacy
November 8, 2022
Scaling Data Access Auditing with Immuta’s Unified Audit Model

With massive amounts of data being generated each day, and an increasing number of people...

November 2, 2022
Improved Orchestration and Deepened Collaboration from Immuta’s Latest Release

Immuta’s latest release is here, and we are excited to share the new orchestration and...

October 28, 2022
Why Data Monitoring is Key to Sensitive Data Protection

According to one 2022 report, 89% of companies claim that their organization is taking a...

October 26, 2022
Data Security, Attacks, and Costly Mistakes: October 2022’s Key Stories

Large-scale approaches to maintaining cloud data security are still relatively nascent for modern organizations. As...

Bob Boule SaaS Data Security Platform
October 24, 2022
Immuta Spotlight: Bob Boule on SaaS Data Security Platforms for Enterprise

As more organizations continue to shift their data to the cloud, teams are often confronted...

October 14, 2022
A Multi-Pronged Approach to Cybersecurity Risk Management Frameworks

What is a Cybersecurity Risk Management Framework? The federal government’s Risk Management Framework (RMF) offers...

Reporting and Auditing in Databricks Using Immuta
October 7, 2022
3 Key Obstacles of Military Data Ops and What They Indicate

There are many lessons that I learned throughout my civilian and military careers, but one...

October 6, 2022
What is Data Governance in Healthcare and Why is it Essential?

According to the U.S. Department of Health and Human Services’ Office for Civil Rights, there...

Unlocked
October 4, 2022
Data Breaches, Leaks, and Fines: September 2022’s Key Stories

Without effective and thorough data security measures, organizations take on quite a bit of unnecessary...

September 30, 2022
Data Innovation Goes Global: The Immuta All Access Tour

More data is created now than ever before. According to Statista, people around the world...

September 28, 2022
Immuta Spotlight: Walter Paz on Data Weaponization

Walter Paz is the Director of Customer Success, Public Sector, for Department of Defense (DoD)...

September 28, 2022
Google BigQuery Access Control and Other Features from Immuta’s Latest Release

Immuta’s latest release is here, and we are excited to share the new features and...

September 27, 2022
Distributed Stewardship for Data Mesh Architecture

Modern enterprises rely on data to deliver insights across every line of business, from sales...

September 14, 2022
What is Data Access Management?

What is Data Access Management? Virtually all modern organizations prioritize the collection and storage of...

September 6, 2022
IDC Report Highlights Cloud Data Management Challenges

Digital-first cloud data management is the future. A survey by the International Data Corporation (IDC)...

August 30, 2022
How to Harness the Power of The Modern Data Stack

For Dave DeWalt, Founder and Managing Director of advisory firm (and Immuta investor) NightDragon, the...

August 29, 2022
Sensitive Data Discovery Tools for Modern Data Stacks

As modern data stacks become more complex, data teams need more efficient ways to manage...

August 24, 2022
Immuta and Snowflake: A Winning Partnership

“What’s really critical to Snowflake customers is that…to use the data that they have, they...

August 19, 2022
RBAC vs. ABAC for Data Access Control Use Cases

As important as data analysis is to modern businesses, enforcing the proper access control on...

August 19, 2022
The Data Privacy Regulation Roundup: What Data Teams Need to Know

When the General Data Protection Regulation (GDPR) entered into force, US privacy law was still...

August 11, 2022
Scaling Secure Data Access with Immuta & Databricks Unity Catalog

For data engineers, the effort required to wrangle access policies grows exponentially as the complexity...

August 10, 2022
Enabling Tableau Row-Level Security with Snowflake & Immuta

The ability to efficiently discover data and visualize it in meaningful ways has never been...

August 3, 2022
Better Together: Immuta and Databricks at the 2022 Data+AI Summit

“Databricks is what I think has thrust this community into a whole new stage of...

August 3, 2022
Redefining Data Sharing for Financial Services

As business continues to shift to increasingly digital environments, the aggregation and sharing of financial...

July 12, 2022
What is Policy-as-Code and Why is it Important?

In the cloud computing era, ensuring data policy is co-created with data is essential. Historically,...

July 11, 2022
Top 3 Lessons from Databricks’ 2022 Data+AI Summit

The world’s largest data and AI conference took over downtown San Francisco the last week...

July 8, 2022
Implementing a Data Security Platform for Cloud Storage Security

As data storage and analysis continue to migrate from on-premises frameworks to those based in...

July 6, 2022
Simplify Data Access for Starburst’s Federated Query Engine and Data Mesh

Immuta + Starburst Integration As market demand for data mesh has grown, the need for...

July 5, 2022
Immuta Introduces New Capabilities and Integrations to Enhance Security for Cloud Data

The data security and privacy space continues to evolve to keep pace with the constantly...

June 30, 2022
How to Create a Data Governance Framework

By 2025, experts anticipate that there will be around 175 zettabytes of data in the...

June 30, 2022
What Types of Data Controls Are There?

Data controls refer to the tactics, policies, and procedures that organizations use to meet their...

June 29, 2022
Data Masking vs. Tokenization: What’s the Difference?

Data protection measures are only as strong as their ability to outsmart increasingly advanced technology...

June 27, 2022
How to Achieve Data Security Governance and Compliance

As data further cements itself as an essential resource for modern businesses, more steps must...

June 14, 2022
How Immuta Simplifies Sensitive Data Tagging for Snowflake Data Lineage

Data is essential to modern business, thanks to its ability to improve insights and drive...

June 13, 2022
Resilient, Agile, and Future-Ready: A Roundtable on the Modern Data Stack

The modern data stack bears the immense responsibility of storing, protecting, analyzing, and operationalizing a...

June 10, 2022
How to Comply with the Zero Trust Executive Order

Since the White House released its Executive Order (EO) on Improving the Nation’s Cybersecurity in...

Immuta’s $100M Series E Funding and Why We’re the Leader in Secure Data Access
June 8, 2022
Immuta’s $100M Series E Funding and Why We’re the Leader in Secure Data Access

I’m excited to announce Immuta’s $100M Series E funding, bringing our total funding to $267M....

June 8, 2022
How to Mask Sensitive Financial Data with Databricks and Immuta

As data moves among the storage, compute, and analysis layers of a data stack, there...

Fostering a Diverse Workplace
June 6, 2022
SQL-Based Enforcement of k-Anonymization

What Is k-Anonymization? Privacy preserving analytics attempt to enable the exploitation of data sets that...

June 1, 2022
How to Enable SaaS Data Governance on Snowflake Partner Connect

Have you wondered how to protect your Snowflake data warehouse with column-, row-, and cell-level...

May 23, 2022
What Is Purpose-Based Access Control (PBAC)?

When it comes to making decisions, context is essential. Imagine your neighbor asks for a...

May 18, 2022
What Are Data Masking Best Practices?

What Is Data Masking? Before diving into best practices for data masking, it’s integral to...

Data Anonymization Best Practices
May 18, 2022
The Top 5 Data Anonymization Best Practices

The data anonymization landscape is broad and constantly evolving as new technology comes online, regulations...

May 13, 2022
What Are the Top Data Anonymization Techniques?

The explosion of organizations that collect and store data for analytics use has led to...

May 13, 2022
What is Data Tokenization and Why is it Important?

What Is Data Tokenization? Why Is Data Tokenization Important for Data Security? When Should I...

May 13, 2022
How to Define a Data Masking Standard for Compliant Analytics

What Are Common Data Masking Techniques? How Should I Define a Data Masking Standard for...

May 13, 2022
What Are the Most Common Types of Data Masking?

Data masking replaces sensitive information with fake but convincing versions of the original data. Given...

Masking of Data
May 10, 2022
What Is Data Masking?

What Is Data Masking? Why Do I Need Data Masking? What Are Some Data Masking...

May 9, 2022
What is Data Anonymization?

What Is Data Anonymization? Data anonymization is the process of transforming information by removing or...

May 9, 2022
How Latch Enables Secure Self-Service Data Analytics with Immuta & Snowflake

A decade ago, having a camera on your doorbell or being able to unlock your...

April 29, 2022
What is a Data Mesh Architecture and How Does it Work?

Governance and security are hot topics in data mesh, as evidenced by the recent webinar I co-presented...

April 27, 2022
Simplifying Snowflake Security with Alation & Immuta

This blog was co-authored with Deepak Nelli, Director of Sales Engineering at Alation. The modern...

April 27, 2022
What Is Policy-Based Access Control?

In daily conversation, we often use umbrella terms to simplify communication. For instance, if someone...

Enterprise Data Security Challenges
April 26, 2022
Data Leaders’ Top 4 Enterprise Data Security Challenges

There’s no disputing the importance of data in driving cutting edge insights and business outcomes....

April 24, 2022
Protect Sensitive Data with Key Privacy Enhancing Techniques

According to the Identity Theft Resource Center, there were 1,862 data breaches in 2021, exceeding the...

April 21, 2022
5 Steps to Make Data a Strategic Asset for Geospatial Intelligence

In 2021, the National Geospatial-Intelligence Agency (NGA) published its new data strategy, which seeks to...

April 6, 2022
The Costs of Cloud-Based Access Control: DIY vs. Automated

Organizations are shifting from on-premises data storage to the cloud, with the goal of profiting...

Data Access Management
April 4, 2022
How To Easily Adapt Data Access Management for Table Grants

Attribute-based access control (ABAC) grants or restricts access to data using context-based decisions based on...

March 23, 2022
Immuta’s Latest Updates Unlock Agility and Improve Accessibility

It’s been another busy quarter for Immuta’s engineering and product teams as they continue to...

March 22, 2022
Data Buzzwords: 15 Trending Terms to Know

The world of data is full of interesting language, complex terms, and more acronyms than...

March 4, 2022
5-Steps to Automating Cloud Data Protection 

Successful data platform teams and championship sports teams have a handful of things in common...

March 4, 2022
SaaS Data Security: Faster, More Flexible Data Access Control

As cloud adoption accelerates, SaaS-based products have also exploded to fill the agility, scalability, and...

February 22, 2022
What is ABAC? Attribute-Based Access Control 101

There’s a lot of confusion in the market about attribute-based access control (ABAC) and what it actually...

February 4, 2022
What Is Multi-Tenancy? An Overview for Cloud Computing

As cloud infrastructures, SaaS deployment models, and data sharing become increasingly prevalent, multi-tenant architectures help ensure cloud-based...

The Myth of Vendor Lock-In: Building vs. Buying in the Federal Market
January 31, 2022
The Myth of Vendor Lock-In: Building vs. Buying in the Federal Market

Recently, across the social media spectrum there has been an uptick in government program leaders,...

January 27, 2022
What is Data Obfuscation? Everything You Should Know

As data use has become ubiquitous in recent years, data breaches have followed suit. In...

Data Localization
January 27, 2022
Data Localization: A Complete Overview

Scientists predict that by 2025, the world will produce a staggering 463 exabytes of data...

3 Best Practices for Maximizing Data Management Efficiency
January 20, 2022
3 Best Practices for Maximizing Data Management Efficiency

In 2020, global spending on cloud data services reached $312 billion. In 2022, Gartner estimates...

January 7, 2022
How to Integrate Identity and Access Management Across Cloud Platforms

Identity and access management (IAM) systems have become essential components of organizational workflows, allowing users...

Modern Cloud Data
January 3, 2022
What’s New in Immuta to Scale Access to Modern Cloud Data

2021 saw the continued adoption of cloud data platforms and solutions. Yet, the same challenges...

Understanding Differential Data Privacy
December 20, 2021
Automated Policy Enforcement is the Key to Self-Service Analytics

Data can deliver an important strategic advantage — if organizations can make it simple and...

December 13, 2021
3 Predictions for Data Security in 2022

While the pandemic’s effects are still being felt, organizations have had a chance to reflect...

December 10, 2021
How to Implement Immuta with Collibra

Immuta is the universal cloud data access control platform that gives data engineering and operations...

November 29, 2021
Immuta SaaS Now Generally Available to Control Access to Modern Data Stacks

To deliver on the need to manage and secure software across modern data stacks, Immuta...

November 23, 2021
Industry Leaders Share Perspectives on the State of Cloud Adoption

With the world of data analytics and governance constantly changing, it is critical for organizations...

November 16, 2021
Snowflake and Immuta Pair Up to Provide an Industry-Leading Data Governance Solution

For Data Engineers responsible for delivering data to consumers, the effort needed to wrangle policies...

November 15, 2021
Automating Snowflake Data Governance for Cloud Data

Organizations are accelerating adoption of modern data stacks to empower growing numbers of internal and...

November 12, 2021
Why a Data Management Framework is Essential

Is it possible to manage a successful business or organization if you’re not successfully managing...

November 2, 2021
2022 State of Data Engineering Survey Highlights Biggest Cloud Data Challenges

The data landscape is in a constant state of evolution, with new technologies and practices...

October 28, 2021
What is CMMC? Cybersecurity Maturity Model Certification Overview

If you’ve heard the term CMMC being used more frequently, you’re not alone. This upcoming...

October 22, 2021
Why Is GDPR Compliance Important and How Do I Achieve It?

A modern analytics environment is typically built to reduce time to data, leaving compliance as...

October 18, 2021
Understanding Differential Privacy

Collecting and analyzing aggregated data is essential in today’s connected world, but are you doing...

Understanding Differential Data Privacy
October 18, 2021
Understanding Differential Data Privacy

In today’s day and age, we’re accustomed to technological advances and capabilities being uncovered all...

October 13, 2021
GigaOm Report Positions Immuta as the Leader in Data Access Control

Data access control and governance are central tenets of a strong cloud data strategy. As...

Provisioned Access
September 22, 2021
Announcing SOC 2 Type 2 Attestation at Immuta

Reinforcing our commitment to data protection and security At Immuta, the security of our customers’...

September 20, 2021
Modernizing From an RBAC to ABAC Model: Is It Hard?

The good news is no. The better news is you are already 90% of the...

September 17, 2021
Cloud Data Security: A Complete Overview

With cloud data platforms becoming the most common way for companies to store and access...

September 13, 2021
What Is a Data Clean Room?

As data has become one of the most prized resources for companies around the world,...

September 13, 2021
The Secrets of Highly Regulated Data-Drive Organizations

GDPR, CCPA, and PIPEDA are just a few examples of the growing number of strict...

August 30, 2021
Data Privacy Technology Is No Longer Optional – Here’s Why

The Future of Data Privacy Regulation The average person doesn’t go through life wondering which...

August 30, 2021
Gartner Hype Cycle for Privacy, 2021

News of data leaks and breaches seems to be increasingly common. While this trend is...

August 27, 2021
New in 2021.3: Performance & Scale for Secure Workloads in Databricks & More

At Immuta, we have a culture of innovation and continuous improvement. We listen to our...

August 25, 2021
How the Executive Order on Zero Trust Improves the Nation’s Cybersecurity

It is something along the lines of common wisdom to describe cybersecurity as the biggest...

August 25, 2021
The Top 3 Data Supply Chain Challenges – And Their Business Impacts

Increasing demand for data and its evolving uses – particularly personal and sensitive data –...

August 16, 2021
What Is a Data Mesh?

A data mesh is an increasingly popular data architecture framework that moves away from the...

August 11, 2021
What is a Data Supply Chain?

We’re all familiar with supply chains in the realm of manufacturing. Well, the same concept...

August 9, 2021
What is Data Orchestration?

Data orchestration is the process of bringing together data from various storage locations, combining it...

August 2, 2021
The Evolution of the Modern Cloud Data Warehouse

Someone starting a small business – think custom t-shirts, candlemaking, etc. – could probably operate...

July 26, 2021
Secure Access to Databricks Without Compromising Performance & Scalability

You need scalability and performance Scalability and performance go hand-in-hand. If you have great performance,...

July 21, 2021
What is Metadata Management?

Metadata management is the collection of policies, processes, and software/hardware platforms used to manage and...

July 21, 2021
Data Intelligence vs. Data Analytics

The terms ‘data intelligence’ and ‘data analytics’ may as well be enshrined in marble for...

July 20, 2021
Immuta vs. Ranger: Research Comparison Finds Immuta’s ABAC Reduces Policy Burden by 75x

The role-based access control versus attribute-based access control debate has been going on for decades....

July 6, 2021
The Top 5 Barriers to Data Sharing and How to Overcome Them

Technology has made our world increasingly interconnected and interdependent, and as a result, the need...

July 1, 2021
Data Sharing Is a Necessity to Accelerate Digital Business

According to Gartner’s report, “By 2024, most organizations will attempt trust-based data sharing programs, but...

June 30, 2021
Your Guide to Deploying Data Access Control Using Immuta SaaS & Self-Managed

Organizations are realizing the value of data lakehouse architectures and, as a result, adoption rates...

June 29, 2021
The Complete Guide to Data Security Compliance Laws and Regulations

Compliance regulations in the data security space are constantly changing and evolving, with more new...

June 28, 2021
What Is Data Redaction?

There’s an old adage that all press is good press, but one kind of attention...

June 28, 2021
Why You Need a Data Audit Trail

Data leaks are everywhere in the news. Is your company safe and readily able to...

June 23, 2021
Data Owners: Privacy is YOUR Problem

Data has been called “the new gold” for its ability to transform and automate business...

June 14, 2021
How Policy-as-Code Automates Fine-Grained Access Controls

Writing or modifying scripts, managing templates, or creating policy for cloud data platforms is historically...

June 12, 2021
Maximize Financial Data Security with Immuta

For more than 160 years, Credit Suisse has been providing customers with best-in-class wealth management,...

Data Masking Tools and Solutions: 2022 Buyer’s Guide
June 10, 2021
Data Masking Tools and Solutions

Data masking is one of the most important tasks in data governance. It may seem...

June 9, 2021
SQL Is Your Data Mesh API

What Is a Data Mesh? As Zhamak Dehghani describes in her original article, “How to...

June 8, 2021
What is Data Generalization? A Complete Overview

Data generalization is the process of creating a more broad categorization of data in a...

June 7, 2021
Data Lake Governance: What Is It and Do You Need It?

Data lakes have become essential tools for businesses in the era of Big Data. But...

June 4, 2021
Layers of Data Policy Enforcement in Cloud Ecosystems

Organizations expanding their cloud data ecosystems (multi- and cross-cloud services for building data products) are...

June 4, 2021
Our 3 Key Takeaways from Databricks’ Data + AI Summit

Databricks’ Data + AI Summit was held virtually over the span of just one week,...

May 26, 2021
Enabling Third Party Sharing with Databricks Data Sharing

Would you like to monetize your internal data by sharing it externally with third parties?...

May 25, 2021
How Immuta Addresses the Department of Defense Data Strategy Goals

Immuta was born out of the Intelligence Community in 2015 to help organizations solve the...

May 20, 2021
Immuta’s $90M in Series D Funding & Our Vision for Cloud Data Access Control

When we founded Immuta in 2015, the data landscape barely resembled what it is today....

Data Localization: A Complete Overview
May 19, 2021
Immuta’s Universal Data Access Control for Lakehouse Architectures

As companies started moving data to the cloud and separating compute and storage for added...

May 13, 2021
Why Immuta is one of CRN’s Coolest Data Management Vendors

We are thrilled to announce Immuta’s recognition as one of the coolest data management and...

May 7, 2021
What is Data De-identification and Why is It Important?

Data de-identification is a form of dynamic data masking that refers to breaking the link between data...

Fostering a Diverse Workplace
May 5, 2021
How Immuta Fosters an Inclusive and Diverse Workplace

Inclusion and diversity are universally considered desirable characteristics for modern workplaces. At Immuta, our commitment...

May 5, 2021
How AstrumU Maximizes Data Privacy & Utility with Immuta & Databricks

Kaj Pedersen, Chief Technical Officer at AstrumU, joined Immuta and Databricks at a recent Amazon...

April 29, 2021
Why Clarifying De-Identification Concepts is Key to Sufficient Data Protection

Data protection law emerged in the 1970’s in Europe as a means to protect against...

April 14, 2021
Everything You Need to Know About K-Anonymity

Businesses and organizations hold more personal data now than ever before. In general, this data...

April 13, 2021
3 Automated Privacy Controls in Databricks Using Immuta

The data your company collects is one of its most valuable assets. And yet, at...

April 9, 2021
Taking Policies the Last Mile with Looker & Immuta

“Don’t Repeat Yourself” is a powerful principle for software engineers and data professionals. But staying...

Reporting and Auditing in Databricks Using Immuta
April 8, 2021
How To: Reporting & Auditing in Databricks Using Immuta

As a data engineer or architect, your organization’s security and compliance teams look to you...

April 8, 2021
This Is Why Your Data Governance Strategy Is Failing

The first step of goal achievement is goal setting, and the first rule of goal...

April 8, 2021
The State of Data & Analytics Governance Is Worse Than You Think

Leadership teams are quick to write off data governance programs – after all, why prioritize...

March 26, 2021
Why Forbes Recognized Immuta as a Top American Startup Employer

We are excited to announce Forbes has recognized Immuta as one of America’s Best Startup...

March 24, 2021
What It Means To Be A Snowflake Premier Partner

Whether your organization has 50 people or 50,000, one common denominator remains: Data analytics is...

March 24, 2021
Separating Value & Governance Transformations with dbt & Immuta

On Immuta’s data team, we put metadata at the center of our access strategy from...

March 17, 2021
What is Fine-Grained Access Control? (And Why It’s So Important)

One of the most traditional methods of determining who can and cannot access certain data...

March 17, 2021
Immuta Introduces Support for Databricks SQL Analytics & Google Cloud

Immuta and Databricks have deepened our strategic partnership and augmented our native product integration by announcing Immuta’s...

March 12, 2021
How to Enforce Policies on Data Platforms with Alation & Immuta

Immuta is the modern data access control and security solution that gives data engineering and...

March 12, 2021
5 Tools for Secure Data Analytics in Okta

More organizations than ever are leveraging the power of multiple cloud data platforms for business-driving...

March 10, 2021
Dogfooding Data Access Control

Data access control: quixotic enterprise initiative, or the top priority of a startup’s first data...

March 3, 2021
5 Important Things to Look For in a Data Governance Tool

A data governance tool can help your organization automate data governance at scale, increase data...

February 12, 2021
How to: Automating Privacy Control in Databricks Using Immuta

“Over the past few years, data privacy has evolved from ‘nice to have’ to a...

February 7, 2021
How The Center for New Data Saved $1 Million with Immuta

By the time COVID-19 was classified as a pandemic, it was already spreading like wildfire....

February 5, 2021
What is Differential Privacy? A Guide for Data Teams

In today’s day and age, we’re accustomed to technological advances and capabilities being uncovered all...

January 22, 2021
The Key to Modernizing Data Governance Programs

“Data initiatives never live up to their full potential without appropriate governance behind [them].” This...

January 20, 2021
How to Unlock Successful, Scalable GDPR Compliance

The General Data Protection Regulation (GDPR) is omnipresent: It applies to every person or entity...

January 20, 2021
How To: Access Controls in Databricks Using Immuta

The pros and cons of role-based access control (RBAC) and attribute-based access control (ABAC) have...

January 20, 2021
What is Data Governance? Everything You Need to Know

Organizations are increasingly recognizing their data as a valuable asset that can significantly shape and...

December 16, 2020
8 Signs You Need Data Access Control for Databricks

Imagine this — You’re at the starting line of a road race. The gun goes...

December 10, 2020
Immuta’s Latest Release: Unlocking the Power of the Cloud Data Ecosystem

As data teams modernize their data stacks for the cloud and adopt multiple cloud data...

November 30, 2020
How to Implement Databricks Access Control with R and Scala

Databricks table ACLs let data engineers programmatically grant and revoke access to tables. With table...

November 17, 2020
Reflecting on a Successful First Year with Databricks

One year ago, Immuta and Databricks announced an expanded partnership with a promise to empower...

November 13, 2020
A 10-Step Guide for Data Security in Cloud Computing

With an industry-wide 92% cloud adoption rate, well over half of organizations using multiple public clouds...

November 12, 2020
Immuta & Starburst Trino: Powering Faster, Safer Analytics & Data Science

Access to sensitive data is more critical to data analytics and data science than ever...

October 30, 2020
3 Signs You Need a Data Engineer

Data engineers are among the most important resources an organization can have, and yet according...

October 20, 2020
Data Engineering is Critical to Driving Data and Analytics Success

Organizations are increasingly relying on data analytics to mine insights that drive business results. Data-driven...

October 16, 2020
Immuta’s Data Team Shares 8 Great Resources for Data Engineers

Many people fall into data engineering by accident. Software engineers may find that they enjoy...

October 16, 2020
Role-Based Access Control vs. Attribute-Based Access Control

The terms role-based access control and attribute-based access control are well known, but not necessarily well understood — or...

October 2, 2020
How to Avoid the Most Common Cloud Migration Challenges

Cloud provider capabilities are evolving faster than ever, and enterprises are taking notice. With all...

October 1, 2020
What is a Data Catalog? 5 Features of a Modern Data Catalog

Imagine going to a library in search of a specific book with a piece of...

Cloud Migration Process
September 25, 2020
4 Reasons to Start Your Cloud Migration Process with Data Security

The vast majority of organizations now utilize the cloud in some form or another, yet...

September 18, 2020
A Low-Risk, Low-Cost Cloud Migration Roadmap

Lifting and shifting data science operations to the cloud can be expensive and risky. From...

September 2, 2020
Enforcing 23 NYCRR 500: The Buck Stops with the CISO

In 2017, the New York Department of Financial Services (NYDFS) passed regulation 23 NYCRR 500,...

August 26, 2020
How k-Anonymization Makes Sensitive Data Use More Secure

A few years removed from the peak of the pandemic, we’re still understanding COVID-19’s impact...

A Call for a Risk-Based Assessment of Anonymization Approaches
August 24, 2020
A Call for a Risk-Based Assessment of Anonymization Approaches

Why it’s time to reexamine the binary dichotomy between personal and aggregate data, and what...

August 17, 2020
4 Ways a Data Science Company Enables Research at Scale

Scalability is critical to driving accurate, applicable researched-based predictions and insights. But without the proper...

August 17, 2020
Myth Busting Legal Compliance Automation in Data Analytics

Let’s face it: compliance can be tricky when it comes to data science and analytics....

June 24, 2020
Data-as-a-Service with Databricks Enterprise Cloud Service

The new Databricks Enterprise Cloud Service architecture provides powerful network security capabilities, however, a lesser...

June 22, 2020
Secure Data Collaboration, Privacy, and Compliance for Databricks

Databricks shops are expanding their analytical use cases, and, in the process, bringing more sensitive...

June 17, 2020
Sneak Preview: Immuta at Spark+AI Summit 2020

Recently on the blog, we wrote about how the deep business partnership between Immuta and...

Databricks and Immuta
June 6, 2020
Databricks and Immuta: Data Analytics with Automated Governance

Immuta and Databricks have formed a deep business partnership and integrated their market-leading analytics and...

June 2, 2020
Using Adaptive Data Governance to Succeed in Digital Business

Data and analytics leaders’ endeavors often do not pass through a centralized organization or figure....

May 14, 2020
Security Meets Privacy… in Databricks

Security is always a driving force, particularly for organizations making the move from on-premises Hadoop...

May 11, 2020
Automate HIPAA De-identification Methods on Amazon RDS

Data engineers and product managers are often responsible for implementing various controls and audit capabilities...

May 6, 2020
Security and Privacy Layers in Snowflake for Highly Sensitive Data

“Over the past few years, data privacy has evolved from ‘nice to have’ to a...

May 3, 2020
New Release: Native Snowflake Policy Enforcement, Dynamic k-anonymization, External Masking

As I prepared to write this blog about the value provided by our latest Immuta...

March 31, 2020
A Lawyer and A Data Scientist Start A Law Firm

At the end of my first week at Immuta, all the way back in 2016,...

March 31, 2020
A Lawyer and A Data Scientist Walk Into A Bar

Today marks the end of my first week at Immuta, and I thought I’d take...

March 10, 2020
Immuta Named One of World’s 50 Most Innovative Companies by Fast Company

Today, Immuta was named to Fast Company’s annual list of the World’s 50 Most Innovative...

Provisioned Access
January 30, 2020
Why Provisioned Access is the Key to the Right to be Forgotten

Since the Court of Justice of the European Union (EU) decided the Google Spain case...

September 9, 2019
Identity & Access Control Management for Public Sector

Immuta was founded in 2015 in response to the U.S. Intelligence Community’s (IC’s) complex and...

July 22, 2019
Why a Data Privacy Compliance Journey Should Start with Privacy by Design

Global interest in privacy has led to a recent explosion in privacy-centric legislation. Consequently, organizations...

April 9, 2019
How Policy Leaders Can Democratize Data Ethics

Now, even Facebook’s Mark Zuckerberg is calling for GDPR-like national data regulations. His goals are laudable. He...

March 5, 2019
7 Legal Principles to Stay Ahead of the Regulatory Curve

Just this year, countries that constitute 50% of the world’s GDP are considering or enforcing...

Differential Privacy
February 5, 2019
Differential Privacy: A Sound Way to Protect Private Data

Striking the privacy-utility balance is the central challenge to organizations handling sensitive data.  Assessing the...

January 30, 2019
An Ongoing Challenge for AI/ML in the Traditional Enterprise: Getting Data to the Cloud

Artificial Intelligence (AI) and Machine Learning (ML) are among the “buzziest” of the buzz words...

January 28, 2019
Data Access Patterns: Start From Scratch; Rinse, Repeat

This is part IV of our “Data Governance Anti-Patterns Series.” You can find part III here....

January 28, 2019
Data Governance Anti-Patterns: Stop Conflating Who, Why, and What

(This Is Part II of Our “Data Governance Anti-Patterns Series”, Part I Can Be Found Here)....

January 16, 2019
A Former Chief Operational Risk Officer for a Global Fortune 300 Bank on Why He Joined Immuta

“How does working for a software start-up compare to working for a massive financial institution?”...

January 15, 2019
Create Instant, Customizable Reports on Data Activities with Immuta

Reports on data processing activities are crucial for compliance. Describing processing activities – like what...

Ethical Data Science
January 15, 2019
5 Ways Immuta Promotes Ethical Data Science & Customer Trust

Amazon’s Alexa. Apple’s Siri. Bank of America’s Erica. These are all examples of marquee “digital...

Data Governance Anti-Patterns
January 8, 2019
Data Governance Anti-Patterns: The Copy & Paste Data Sharing Method

(This Is Part III of Our “Data Governance Anti-Patterns Series,” Part II Can Be Found...

December 19, 2018
Differentiating Data Security in the GDPR from Privacy

The European Union’s General Data Protection Regulation — one of the most forward-leaning privacy regulations...

November 21, 2018
Why a Professor in Information Technology Law & Data Governance Joined Immuta

I joined the Immuta team last Monday and, since then, have been asked several times:...

Homomorphic Encryption
September 14, 2018
Homomorphic Encryption Alone Is Security, Not Privacy

I’ve seen written many times that “Privacy can be improved with techniques like differential privacy...

April 9, 2018
Spark Is Now In Immuta!

Announcement Immuta is happy to announce our 2.1 release which includes native SparkSQL policy enforcement....

January 22, 2018
What’s A Legal Engineer?

Just over a year ago, I wrote a blogpost titled “A Lawyer and A Data...

December 12, 2017
Stop Reinventing the Wheel: The Case for Unified Data Policies

(This Is Part I of Our “Data Governance Anti-Patterns Series”, Part II Can Be Found Here). Anti-patterns...

June 20, 2017
Q&A with Dataiku CEO Florian Douetteau about Data Governance and Machine Learning

Enterprises have a wealth of data at their fingertips and are eager to accelerate data...

April 12, 2016
Data Privacy & Data Science: The Next Generation of Data Experimentation

Collection of consumer data is mainstream and global. The generally accepted premise of the big...