Webinar: Join Immuta, HP, & NightDragon to learn why managing access is critical for the future of data use.

Sign Up

Immuta Unlocked

Featured

Sign up to receive Immuta Unlocked™ monthly news and updates!

Get our expert articles, guides, tips, and inspiration. It's Immuta Unlocked™ straight to your inbox.

August 11, 2022
Scaling Secure Data Access with Immuta & Databricks Unity Catalog

For data engineers, the effort required to wrangle access policies grows exponentially as the complexity...

August 10, 2022
How to Enable Tableau Row-Level Security with Snowflake & Immuta

The ability to efficiently discover data and visualize it in meaningful ways has never been...

August 3, 2022
Better Together: Immuta and Databricks at the 2022 Data+AI Summit

“Databricks is what I think has thrust this community into a whole new stage of...

August 3, 2022
Redefining Data Sharing for Financial Services

As business continues to shift to increasingly digital environments, the aggregation and sharing of financial...

July 12, 2022
What is Policy-as-Code and Why is it Important?

In the cloud computing era, ensuring data policy is co-created with data is essential. Historically,...

Featured
July 11, 2022
Top 3 Lessons from Databricks’ 2022 Data+AI Summit

The world’s largest data and AI conference took over downtown San Francisco the last week...

July 8, 2022
3 Tips for Implementing a Future-Ready Data Security Platform

As data storage and analysis continue to migrate from on-premises to the cloud, the market...

July 6, 2022
Simplify Data Access for Starburst’s Federated Query Engine and Data Mesh

Immuta + Starburst Integration As market demand for data mesh has grown, the need for...

Immuta Unlocked™
straight to your inbox

Sign up to get expert articles, guides, tips,
and inspiration straight to your inbox.

July 5, 2022
Immuta Introduces New Capabilities and Integrations to Enhance Security for Cloud Data

The data security and privacy space continues to evolve to keep pace with the constantly...

June 30, 2022
The Complete Guide to Data Governance Frameworks

By 2025, experts anticipate that there will be around 175 zettabytes of data in the...

June 29, 2022
Tokenization vs. Data Masking: What’s the Difference?

Data protection measures are only as strong as their ability to outsmart increasingly advanced technology...

June 27, 2022
How Data Governance and Compliance Operate Hand-in-Hand

As data further cements itself as an essential resource for modern businesses, more steps must...

June 14, 2022
How Immuta Simplifies Sensitive Data Tagging for Snowflake Data Lineage

Data is essential to modern business, thanks to its ability to improve insights and drive...

June 13, 2022
Resilient, Agile, and Future-Ready: A Roundtable on the Modern Data Stack

The modern data stack bears the immense responsibility of storing, protecting, analyzing, and operationalizing a...

June 10, 2022
How Data Will Enhance a Zero Trust Transition in Government

A year after the White House released its Executive Order (EO) on Improving the Nation’s...

Immuta’s $100M Series E Funding and Why We’re the Leader in Secure Data Access
June 8, 2022
Immuta’s $100M Series E Funding and Why We’re the Leader in Secure Data Access

I’m excited to announce Immuta’s $100M Series E funding, bringing our total funding to $267M....

June 8, 2022
How to Mask Sensitive Financial Data with Databricks and Immuta

As data moves among the storage, compute, and analysis layers of a data stack, there...

Fostering a Diverse Workplace
June 6, 2022
SQL-Based Enforcement of k-Anonymization

What Is k-Anonymization? Privacy preserving analytics attempt to enable the exploitation of data sets that...

June 3, 2022
How Pumpjack Dataworks Is Increasing the Value of Fan Data with Databricks and Immuta

The world of sports is no longer confined to stadiums and TV. As sports have...

June 1, 2022
How to Deploy Immuta SaaS on Snowflake Partner Connect

Have you wondered how to protect your Snowflake data warehouse with column-, row-, and cell-level...

May 23, 2022
What Is Purpose-Based Access Control (PBAC)?

When it comes to making decisions, context is essential. Imagine your neighbor asks for a...

May 18, 2022
What Are Data Masking Best Practices?

What Is Data Masking?  Before diving into best practices for data masking, it’s integral to...

Data Anonymization Best Practices
May 18, 2022
What Are Data Anonymization Best Practices? The Top 5 Tips

The data anonymization landscape is broad and constantly evolving as new technology comes online, regulations...

May 13, 2022
What Are the Top Data Anonymization Techniques? A Complete Guide

The explosion of organizations that collect and store data for analytics use has led to...

May 13, 2022
What Is Data Tokenization?

What Is Data Tokenization? Why Is Data Tokenization Important for Data Security? When Should I...

May 13, 2022
How to Define a Data Masking Standard for Compliant Analytics

What Are Common Data Masking Techniques? How Should I Define a Data Masking Standard for...

May 13, 2022
What Are the Most Common Types of Data Masking?

What Are the Most Common Types of Data Masking? Data masking is a type of...

Masking of Data
May 10, 2022
What Is Data Masking?

What Is Data Masking? Why Do I Need Data Masking? What Are Some Data Masking...

May 9, 2022
What is Data Anonymization?

What Is Data Anonymization? Why Do I Need Data Anonymization? Data Anonymization Techniques When Do...

May 9, 2022
How Latch Enables Secure Self-Service Data Analytics with Immuta & Snowflake

A decade ago, having a camera on your doorbell or being able to unlock your...

April 29, 2022
How to Decentralize Data Access Policies in the Data Mesh Architecture

Governance and security are hot topics in data mesh, as evidenced by the recent webinar I co-presented...

April 27, 2022
How to Simplify Snowflake Security with Alation and Immuta

This blog was co-authored with Deepak Nelli, Director of Sales Engineering at Alation. The modern...

April 27, 2022
What Is Policy-Based Access Control?

In daily conversation, we often use umbrella terms to group things together. If someone tells...

Enterprise Data Security Challenges
April 26, 2022
Data Leaders’ Top 4 Enterprise Data Security Challenges

There’s no disputing the importance of data in driving cutting edge insights and business outcomes....

April 24, 2022
How to Mask PII Data: A Guide to Data Masking Techniques

According to the Identity Theft Resource Center, there were 1,862 data breaches in 2021, exceeding the...

April 21, 2022
5 Steps to Make Data a Strategic Asset for Geospatial Intelligence

In 2021, the National Geospatial-Intelligence Agency (NGA) published its new data strategy, which seeks to...

April 6, 2022
The Costs of Cloud-Based Access Control: DIY vs. Automated

Organizations are shifting from on-premises data storage to the cloud, with the goal of profiting...

Data Access Management
April 4, 2022
How To Easily Adapt Data Access Management for Table Grants

Attribute-based access control (ABAC) grants or restricts access to data using context-based decisions based on...

March 23, 2022
Immuta’s Latest Updates Unlock Agility and Improve Accessibility

It’s been another busy quarter for Immuta’s engineering and product teams as they continue to...

March 22, 2022
Data Buzzwords: 15 Trending Terms to Know

The world of data is full of interesting language, complex terms, and more acronyms than...

March 4, 2022
5 Steps to Automating & Protecting All Your Data

Successful data platform teams and championship sports teams may have several commonalities, like strong baseline...

March 4, 2022
SaaS-Based Data Access Control Will Revolutionize Data Use at Scale

As cloud adoption accelerates, SaaS-based products have also exploded to fill the agility, scalability, and...

February 4, 2022
What Is Multi-Tenancy? An Overview for Cloud Computing

As cloud infrastructures, SaaS deployment models, and data sharing become increasingly prevalent, multi-tenant architectures help ensure cloud-based...

The Myth of Vendor Lock-In: Building vs. Buying in the Federal Market
January 31, 2022
The Myth of Vendor Lock-In: Building vs. Buying in the Federal Market

Recently, across the social media spectrum there has been an uptick in government program leaders,...

January 27, 2022
What Is Data Obfuscation? Everything Data Owners Should Know

As data use has become ubiquitous in recent years, data breaches have followed suit. In...

Data Localization
January 27, 2022
Data Localization: A Complete Overview

Scientists predict that by 2025, the world will produce a staggering 463 exabytes of data...

3 Best Practices for Maximizing Data Management Efficiency
January 20, 2022
3 Best Practices for Maximizing Data Management Efficiency

In 2020, global spending on cloud data services reached $312 billion. In 2022, Gartner estimates...

January 7, 2022
How to Integrate Identity and Access Management Across Cloud Platforms

Identity and access management (IAM) systems have become essential components of organizational workflows, allowing users...

Modern Cloud Data
January 3, 2022
What’s New in Immuta to Scale Access to Modern Cloud Data

2021 saw the continued adoption of cloud data platforms and solutions. Yet, the same challenges...

December 20, 2021
Why Automated Policy Enforcement is the Backbone of Modern DataOps & Self-Service Analytics

Data is a key commodity that agencies can leverage for strategic advantage — if they...

December 13, 2021
3 Predictions for Data Security in 2022

While the pandemic’s effects are still being felt, organizations have had a chance to reflect...

December 10, 2021
How to Implement Immuta with Collibra

Immuta is the universal cloud data access control platform that gives data engineering and operations...

November 29, 2021
Immuta SaaS Now Generally Available to Control Access to Modern Data Stacks

To deliver on the need to manage and secure software across modern data stacks, Immuta...

November 23, 2021
Industry Leaders Share Perspectives on the State of Cloud Adoption

With the world of data analytics and governance constantly changing, it is critical for organizations...

Immuta and Snowflake
November 16, 2021
Snowflake and Immuta Pair Up to Provide an Industry-Leading Data Governance Solution

For Data Engineers responsible for delivering data to consumers, the effort needed to wrangle policies...

November 15, 2021
New Snowflake Data Governance Automation and Innovation Across Cloud Data

Organizations are accelerating adoption of modern data stacks to empower growing numbers of internal and...

November 12, 2021
Why a Data Management Framework is Essential

Is it possible to manage a successful business or organization if you’re not successfully managing...

November 2, 2021
2022 State of Data Engineering Survey Highlights Biggest Cloud Data Challenges

The data landscape is in a constant state of evolution, with new technologies and practices...

October 28, 2021
What is CMMC? Cybersecurity Maturity Model Certification Overview

If you’ve heard the term CMMC being used more frequently, you’re not alone. This upcoming...

October 22, 2021
5 Essential Steps for Building a GDPR-Compliant Data Strategy

A modern analytics environment is typically built to reduce time to data, leaving compliance as...

October 18, 2021
Understanding Differential Data Privacy

Collecting and analyzing aggregated data is essential in today’s connected world, but are you doing...

Understanding Differential Data Privacy
October 18, 2021
Understanding Differential Data Privacy

In today’s day and age, we’re accustomed to technological advances and capabilities being uncovered all...

October 13, 2021
GigaOm Report Positions Immuta as the Leader in Data Access Control

Data access control and governance are central tenets of a strong cloud data strategy. As...

Provisioned Access
September 22, 2021
Announcing SOC 2 Type 2 Certification at Immuta

Reinforcing our commitment to data protection and security At Immuta, the security of our customers’...

September 20, 2021
Modernizing From an RBAC to ABAC Model: Is It Hard?

The good news is no. The better news is you are already 90% of the...

September 17, 2021
Cloud Data Security: A Complete Overview

With cloud data platforms becoming the most common way for companies to store and access...

September 13, 2021
What Is a Data Clean Room?

As data has become one of the most prized resources for companies around the world,...

September 13, 2021
The Secrets of Highly Regulated Data-Drive Organizations

GDPR, CCPA, and PIPEDA are just a few examples of the growing number of strict...

August 30, 2021
Data Privacy Technology Is No Longer Optional – Here’s Why

The Future of Data Privacy Regulation The average person doesn’t go through life wondering which...

August 30, 2021
Gartner Hype Cycle for Privacy, 2021

News of data leaks and breaches seems to be increasingly common. While this trend is...

August 27, 2021
New in 2021.3: Performance & Scale for Secure Workloads in Databricks & More

At Immuta, we have a culture of innovation and continuous improvement. We listen to our...

August 25, 2021
Cybersecurity’s Blind Spot: Evaluating the Executive Order on Improving the Nation’s Cybersecurity

It is something along the lines of common wisdom to describe cybersecurity as the biggest...

August 25, 2021
The Top 3 Data Supply Chain Challenges – And Their Business Impacts

Increasing demand for data and its evolving uses – particularly personal and sensitive data –...

August 16, 2021
What Is a Data Mesh?

A data mesh is a relatively new data platform architecture that moves away from the...

Data Access Management
August 11, 2021
What Is the Data Supply Chain?

We’re all familiar with supply chains in the realm of manufacturing. Well, the same concept...

August 9, 2021
What is Data Orchestration?

Data orchestration is the process of bringing together data from various storage locations, combining it...

August 2, 2021
The Modern Cloud Data Warehouse

As data has become increasingly central to business operations and results, it’s essential for organizations...

July 26, 2021
Secure Access to Databricks Without Compromising Performance & Scalability

You need scalability and performance Scalability and performance go hand-in-hand. If you have great performance,...

July 21, 2021
What is Metadata Management?

Metadata management is the collection of policies, processes, and software/hardware platforms used to manage and...

July 21, 2021
Data Intelligence vs. Data Analytics

The terms ‘data intelligence’ and ‘data analytics’ may as well be enshrined in marble for...

July 20, 2021
Immuta vs. Ranger: Research Comparison Finds Immuta’s ABAC Reduces Policy Burden by 75x

The role-based access control versus attribute-based access control debate has been going on for decades....

July 6, 2021
The Top 5 Barriers to Data Sharing and How to Overcome Them

Technology has made our world increasingly interconnected and interdependent, and as a result, the need...

July 1, 2021
Data Sharing Is a Necessity to Accelerate Digital Business

According to Gartner’s report, “By 2024, most organizations will attempt trust-based data sharing programs, but...

June 30, 2021
Your Guide to Deploying Data Access Control Using Immuta SaaS & Self-Managed

Organizations are realizing the value of data lakehouse architectures and, as a result, adoption rates...

June 29, 2021
The Complete Guide to Data Security Compliance Laws and Regulations

Compliance regulations in the data security space are constantly changing and evolving, with more new...

June 28, 2021
What Is Data Redaction?

There’s an old adage that all press is good press, but one kind of attention...

June 28, 2021
Why You Need a Data Audit Trail

Data leaks are everywhere in the news. Is your company safe and readily able to...

June 23, 2021
Data Owners: Privacy is YOUR Problem

Data has been called “the new gold” for its ability to transform and automate business...

June 14, 2021
Automate Fine-Grained Access Controls with Policy-as-Code

Writing or modifying scripts, managing templates, or creating policy for cloud data access control platforms...

June 12, 2021
Maximizing Financial Firms’ Data with Immuta

For more than 160 years, Credit Suisse has been providing customers with best-in-class wealth management,...

Data Masking Tools and Solutions: 2022 Buyer’s Guide
June 10, 2021
Data Masking Tools and Solutions: 2022 Buyer’s Guide

Data masking is one of the most important tasks in data governance. It may seem...

June 9, 2021
SQL Is Your Data Mesh API

What Is a Data Mesh? As Zhamak Dehghani describes in her original article, “How to...

June 8, 2021
What is Data Generalization? A Complete Overview

Data generalization is the process of creating a more broad categorization of data in a...

June 7, 2021
Data Lake Security: What Is It, and Do You Need It?

Data lakes have become essential tools for businesses in the era of Big Data. But...

June 4, 2021
Layers of Policy Enforcement for Security Policies in Cloud Data Ecosystems

Organizations expanding their cloud data ecosystems (multi- and cross-cloud services for building data products) are...

June 4, 2021
Our 3 Key Takeaways from Databricks’ Data + AI Summit

Databricks’ Data + AI Summit was held virtually over the span of just one week,...

May 26, 2021
Enabling Third Party Data Sharing with Databricks Delta Sharing

Would you like to monetize your internal data by sharing it externally with third parties?...

May 25, 2021
How Immuta Addresses the Department of Defense Data Strategy Goals

Immuta was born out of the Intelligence Community in 2015 to help organizations solve the...

May 20, 2021
Immuta’s $90M in Series D Funding & Our Vision for Cloud Data Access Control

When we founded Immuta in 2015, the data landscape barely resembled what it is today....

Data Localization: A Complete Overview
May 19, 2021
Immuta’s Universal Data Access Control for Lakehouse Architectures

As companies started moving data to the cloud and separating compute and storage for added...

May 13, 2021
Why Immuta is one of CRN’s Coolest Data Management Vendors

We are thrilled to announce Immuta’s recognition as one of the coolest data management and...

May 7, 2021
What is Data De-identification and Why is It Important?

Data de-identification is a form of dynamic data masking that refers to breaking the link between data...

Fostering a Diverse Workplace
May 5, 2021
How Immuta Fosters an Inclusive and Diverse Workplace

Inclusion and diversity are universally considered desirable characteristics for modern workplaces. At Immuta, our commitment...

May 5, 2021
How AstrumU Maximizes Data Privacy & Utility with Immuta & Databricks

Kaj Pedersen, Chief Technical Officer at AstrumU, joined Immuta and Databricks at a recent Amazon...

April 29, 2021
Why Clarifying De-Identification Concepts is Key to Sufficient Data Protection

Data protection law emerged in the 1970’s in Europe as a means to protect against...

April 14, 2021
K-Anonymity: Everything You Need to Know (2022 Guide)

Businesses and organizations hold more personal data now than ever before. In general, this data...

April 13, 2021
3 Automated Privacy Controls in Databricks Using Immuta

The data your company collects is one of its most valuable assets. And yet, at...

April 9, 2021
Taking Policies the Last Mile with Looker & Immuta

“Don’t Repeat Yourself” is a powerful principle for software engineers and data professionals. But staying...

Reporting and Auditing in Databricks Using Immuta
April 8, 2021
How To: Reporting & Auditing in Databricks Using Immuta

As a data engineer or architect, your organization’s security and compliance teams look to you...

April 8, 2021
This Is Why Your Data Governance Strategy Is Failing

The first step of goal achievement is goal setting, and the first rule of goal...

April 8, 2021
The State of Data & Analytics Governance Is Worse Than You Think

Leadership teams are quick to write off data governance programs – after all, why prioritize...

March 26, 2021
Why Forbes Recognized Immuta as a Top American Startup Employer

We are excited to announce Forbes has recognized Immuta as one of America’s Best Startup...

Immuta and Snowflake
March 24, 2021
What It Means To Be A Snowflake Premier Partner

Whether your organization has 50 people or 50,000, one common denominator remains: Data analytics is...

March 24, 2021
Separating Value & Governance Transformations with dbt & Immuta

On Immuta’s data team, we put metadata at the center of our access strategy from...

March 17, 2021
What is Fine-Grained Access Control? (And Why It’s So Important)

One of the most traditional methods of determining who can and cannot access certain data,...

March 17, 2021
Immuta Introduces Support for Databricks SQL Analytics & Google Cloud

Immuta and Databricks have deepened our strategic partnership and augmented our native product integration by announcing Immuta’s...

March 12, 2021
How to Enforce Policies on Data Platforms with Alation & Immuta

Immuta is the modern data access control and security solution that gives data engineering and...

March 12, 2021
5 Tools for Secure Data Analytics in Okta

More organizations than ever are leveraging the power of multiple cloud data platforms for business-driving...

March 10, 2021
Dogfooding Data Access Control

Data access control: quixotic enterprise initiative, or the top priority of a startup’s first data...

March 3, 2021
5 Important Things to Look For in a Data Governance Tool

A data governance tool can help your organization automate data governance at scale, increase data...

February 12, 2021
How to: Automating Privacy Control in Databricks Using Immuta

“Over the past few years, data privacy has evolved from ‘nice to have’ to a...

February 7, 2021
How The Center for New Data Saved $1 Million with Immuta

By the time COVID-19 was classified as a pandemic, it was already spreading like wildfire....

February 5, 2021
What is Differential Privacy? The Ultimate Guide for Data Teams

In today’s day and age, we’re accustomed to technological advances and capabilities being uncovered all...

January 22, 2021
The Key to Modernizing Data Governance Programs

“Data initiatives never live up to their full potential without appropriate governance behind [them].” This...

January 20, 2021
How to Unlock Successful, Scalable GDPR Compliance

The General Data Protection Regulation (GDPR) is omnipresent: It applies to every person or entity...

January 20, 2021
How To: Access Controls in Databricks Using Immuta

The pros and cons of role-based access control (RBAC) and attribute-based access control (ABAC) have...

January 20, 2021
What is Data Governance? Everything You Need to Know

Organizations are increasingly recognizing their data as a valuable asset that can significantly shape and...

December 16, 2020
8 Signs You Need Data Access Control for Databricks

Imagine this — You’re at the starting line of a road race. The gun goes...

December 10, 2020
Immuta’s Latest Release: Unlocking the Power of the Cloud Data Ecosystem

As data teams modernize their data stacks for the cloud and adopt multiple cloud data...

November 30, 2020
How to Implement Databricks Access Control with R and Scala

Databricks table ACLs let data engineers programmatically grant and revoke access to tables. With table...

November 18, 2020
CCPA 2.0: What It Means for Protecting Your Data

The 2020 elections not only saw record turnout, but also ushered in a suite of...

November 17, 2020
Reflecting on a Successful First Year with Databricks

One year ago, Immuta and Databricks announced an expanded partnership with a promise to empower...

November 13, 2020
10-Step Guide for Data Governance in Cloud Computing

With an industry-wide 92% cloud adoption rate, well over half of organizations using multiple public clouds...

November 12, 2020
Immuta & Starburst Trino: Powering Faster, Safer Analytics & Data Science

Access to sensitive data is more critical to data analytics and data science than ever...

October 30, 2020
3 Signs You Need a Data Engineer

Data engineers are among the most important resources an organization can have, and yet according...

October 20, 2020
Data Engineering is Critical to Driving Data and Analytics Success

Organizations are increasingly relying on data analytics to mine insights that drive business results. Data-driven...

October 16, 2020
Immuta’s Data Team Shares 8 Great Resources for Data Engineers

Many people fall into data engineering by accident. Software engineers may find that they enjoy...

October 2, 2020
How to Avoid the Most Common Cloud Migration Challenges

Cloud provider capabilities are evolving faster than ever, and enterprises are taking notice. With all...

October 1, 2020
What is a Data Catalog? 5 Features of a Modern Data Catalog

Imagine going to a library in search of a specific book with a piece of...

Cloud Migration Process
September 25, 2020
4 Reasons to Start Your Cloud Migration Process with Data Security

The vast majority of organizations now utilize the cloud in some form or another, yet...

September 18, 2020
A Low-Risk, Low-Cost Cloud Migration Roadmap

Lifting and shifting data science operations to the cloud can be expensive and risky. From...

September 2, 2020
Enforcing 23 NYCRR 500: The Buck Stops with the CISO

In 2017, the New York Department of Financial Services (NYDFS) passed regulation 23 NYCRR 500,...

August 26, 2020
How k-Anonymization is Making Health Data More Secure

As COVID-19 continues to impact daily life, the importance of collecting and sharing health data...

A Call for a Risk-Based Assessment of Anonymization Approaches
August 24, 2020
A Call for a Risk-Based Assessment of Anonymization Approaches

Why it’s time to reexamine the binary dichotomy between personal and aggregate data, and what...

August 17, 2020
4 Ways a Data Science Company Enables Research at Scale

Scalability is critical to driving accurate, applicable researched-based predictions and insights. But without the proper...

August 17, 2020
Myth Busting Legal Compliance Automation in Data Analytics

Let’s face it: compliance can be tricky when it comes to data science and analytics....

June 24, 2020
Data-as-a-Service with Databricks Enterprise Cloud Service

The new Databricks Enterprise Cloud Service architecture provides powerful network security capabilities, however, a lesser...

June 22, 2020
New Data Collaboration, Advanced Privacy, and CCPA & HIPAA Policies for Databricks

Databricks shops are expanding their analytical use cases, and, in the process, bringing more sensitive...

June 17, 2020
Sneak Preview: Immuta at Spark+AI Summit 2020

Recently on the blog, we wrote about how the deep business partnership between Immuta and...

Databricks and Immuta
June 6, 2020
Databricks and Immuta: Data Analytics with Automated Governance

Immuta and Databricks have formed a deep business partnership and integrated their market-leading analytics and...

June 2, 2020
Data and Analytics Leaders Must Use Adaptive Governance to Succeed in Digital Business

Data and analytics leaders’ endeavors often do not pass through a centralized organization or figure....

May 14, 2020
Security Meets Privacy… in Databricks

Security is always a driving force, particularly for organizations making the move from on-premises Hadoop...

May 11, 2020
Automate HIPAA De-identification Methods on Amazon RDS

Data engineers and product managers are often responsible for implementing various controls and audit capabilities...

May 6, 2020
Security and Privacy Layers in Snowflake for Highly Sensitive Data

“Over the past few years, data privacy has evolved from ‘nice to have’ to a...

May 3, 2020
New Release: Native Snowflake Policy Enforcement, Dynamic k-anonymization, External Masking

As I prepared to write this blog about the value provided by our latest Immuta...

March 31, 2020
A Lawyer and A Data Scientist Start A Law Firm

At the end of my first week at Immuta, all the way back in 2016,...

March 31, 2020
A Lawyer and A Data Scientist Walk Into A Bar

Today marks the end of my first week at Immuta, and I thought I’d take...

March 10, 2020
Immuta Named One of World’s 50 Most Innovative Companies by Fast Company

Today, Immuta was named to Fast Company’s annual list of the World’s 50 Most Innovative...

Provisioned Access
January 30, 2020
Why Provisioned Access is the Key to the Right to be Forgotten

Since the Court of Justice of the European Union (EU) decided the Google Spain case...

September 9, 2019
Identity & Access Control Management for Public Sector Missions

Immuta was founded in 2015 in response to the U.S. Intelligence Community’s (IC’s) complex and...

July 22, 2019
Why a Privacy Law Compliance Journey Should Start with Privacy by Design

Global interest in privacy has led to a recent explosion in privacy-centric legislation. Consequently, organizations...

April 9, 2019
How Policy Leaders Can Democratize Data Ethics

Now, even Facebook’s Mark Zuckerberg is calling for GDPR-like national data regulations. His goals are laudable. He...

March 5, 2019
7 Legal Principles to Stay Ahead of the Regulatory Curve

Just this year, countries that constitute 50% of the world’s GDP are considering or enforcing...

Differential Privacy
February 5, 2019
Differential Privacy: A Sound Way to Protect Private Data

Striking the privacy-utility balance is the central challenge to organizations handling sensitive data.  Assessing the...

January 30, 2019
An Ongoing Challenge for AI/ML in the Traditional Enterprise: Getting Data to the Cloud

Artificial Intelligence (AI) and Machine Learning (ML) are among the “buzziest” of the buzz words...

January 28, 2019
Data Governance Anti-Patterns: Start From Scratch; Rinse, Repeat

This is part IV of our “Data Governance Anti-Patterns Series.” You can find part III here....

January 28, 2019
Data Governance Anti-Patterns: Stop Conflating Who, Why, and What

(This Is Part II of Our “Data Governance Anti-Patterns Series”, Part I Can Be Found Here)....

January 16, 2019
A Former Chief Operational Risk Officer for a Global Fortune 300 Bank on Why He Joined Immuta

“How does working for a software start-up compare to working for a massive financial institution?”...

January 15, 2019
Create Instant, Customizable Reports on Data Activities with Immuta

Reports on data processing activities are crucial for compliance. Describing processing activities – like what...

Ethical Data Science
January 15, 2019
5 Ways Immuta Promotes Ethical Data Science & Customer Trust

Amazon’s Alexa. Apple’s Siri. Bank of America’s Erica. These are all examples of marquee “digital...

Data Governance Anti-Patterns
January 8, 2019
Data Governance Anti-Patterns: The Copy & Paste Data Sharing Method

(This Is Part III of Our “Data Governance Anti-Patterns Series,” Part II Can Be Found...

December 19, 2018
Parsing Data Security from Privacy in the GDPR

The European Union’s General Data Protection Regulation — one of the most forward-leaning privacy regulations...

November 21, 2018
Why a Professor in Information Technology Law & Data Governance Joined Immuta

I joined the Immuta team last Monday and, since then, have been asked several times:...

Homomorphic Encryption
September 14, 2018
Homomorphic Encryption Alone Is Security, Not Privacy

I’ve seen written many times that “Privacy can be improved with techniques like differential privacy...

April 9, 2018
Spark Is Now In Immuta!

Announcement Immuta is happy to announce our 2.1 release which includes native SparkSQL policy enforcement....

February 23, 2018
Creating a Data-First Enterprise

Establishing data management is a foundational step to creating a productive data science organization. Data...

January 22, 2018
What’s A Legal Engineer?

Just over a year ago, I wrote a blogpost titled “A Lawyer and A Data...

December 12, 2017
Data Governance Anti-Patterns: Data Policies Shouldn’t Be Snowflakes

(This Is Part I of Our “Data Governance Anti-Patterns Series”, Part II Can Be Found Here). Anti-patterns...

June 20, 2017
Q&A with Dataiku CEO Florian Douetteau about Data Governance and Machine Learning

Enterprises have a wealth of data at their fingertips and are eager to accelerate data...

April 12, 2016
Data Privacy & Data Science: The Next Generation of Data Experimentation

Collection of consumer data is mainstream and global. The generally accepted premise of the big...