All Guides

Intro to Data Security
Cloud Data Governance 101

Cloud Data Governance 101 If you’re like most organizations, your data is scattered across...

Governance & Security
Data Governance vs. Data Management

Data Governance vs. Data Management Thanks to the ubiquity of cloud storage and computing,...

All Data Platforms
Zero Trust at Scale: Securing Federal Data

Zero Trust at Scale: Securing Federal Data For federal agencies, protecting sensitive data isn’t...

Governance & Security
7 Data Governance Challenges & How to Beat Them

7 Data Governance Challenges & How to Beat Them Data governance may seem fairly...

Monitoring, Audit, & Compliance
HIPAA Expert Determination: Everything You Need to Know

HIPAA Expert Determination: Everything You Need to Know For 13 years and counting, the...

Governance & Security
Adaptive Data Governance: What It Is & Why You Need It

Adaptive Data Governance: What It Is & Why You Need It The physician and...

Governance & Security
Fine-Grained Authorization: Data Security with Precision

Fine-Grained Authorization: Data Security with Precision When we think of the term “authorization,” physical...

Snowflake
Implementing Snowflake Column-Level Security for PII & PHI

As sensitive data, like personally identifiable information (PII) and protected health information (PHI), becomes...

Snowflake
How to Scale Cross-Organization Snowflake Data Sharing

In this blog, you’ll learn about: Snowflake data shares Considerations and complexities that can...

Alation
How to Implement Immuta Within Alation

Immuta is the modern data security platform that gives you the power to leverage...

Snowflake
Immuta & Snowflake for Data Mesh Federated Governance

Immuta & Snowflake for Data Mesh Federated Governance In this demo, Immuta CTO Steve...

Redshift
Enforcing Redshift Attribute-Based Access Control

Organizations are increasingly adopting data lakehouse architectures to reap the benefits of added flexibility,...

Databricks
How to Use Immuta’s Integration with Databricks Unity Catalog

How to Use Immuta’s Integration with Databricks Unity Catalog Immuta is the first Data...

Databricks
How to Implement Databricks Data Masking Across Platforms

As cloud data platform adoption accelerates and organizations become more reliant on data, teams...

Databricks
How to Anonymize Data with Databricks Access Control

Organizations with large workforces are increasingly analyzing employee data using cloud data platforms such...

Snowflake
How to Manage Snowflake Fine-Grained Access Control

If Disney World were a database, we would rave about its access control strategy....

Snowflake
How to Implement Snowflake Data Masking Across Platforms

As cloud data platform adoption accelerates and organizations become more reliant on data, teams...

Snowflake
How to Implement Row-Level Security in Snowflake

Segmenting data by geographies is a common requirement for row access policies in Snowflake....

Snowflake
How To Enable Snowflake Attribute-Based Access Control

Cloud data platforms such as Snowflake provide native security and data access controls engineered for platform-specific administrators to...

Threat & Risk Management
Cloud SIEM: A Blueprint for Proactive Monitoring & Response

Cloud SIEM: A Blueprint for Proactive Monitoring & Response When a data breach occurs,...

Threat & Risk Management
What Is Managed Detection and Response?

What Is Managed Detection and Response? Modern hybrid and multi-cloud environments are complex, making...

Threat & Risk Management
Insider Risk Management: What CISOs Need to Know

Insider Risk Management: What CISOs Need to Know One of the most significant threats...

Threat & Risk Management
Data Risk Management 101

Data Risk Management 101 Security breaches and cyberattacks have become all too common in...

Monitoring, Detection, & Audit
How to Build an Audit Logging and Monitoring Policy

How to Build an Audit Logging and Monitoring Policy According to IBM’s 2022 Cost...

Monitoring, Detection, & Audit
What User Behavior Analytics Can Tell You About Data Threats

What User Behavior Analytics Can Tell You About Data Threats Behavioral analytics has long...

Monitoring, Detection, & Audit
A Guide to Data Compliance Regulations

A Guide to Data Compliance Regulations As with data resources and platforms, data regulations...

Monitoring, Detection, & Audit
Data Observability vs. Data Detection

Data Observability vs. Data Detection The modern data stack is continually evolving, and confusion...

Governance & Security
Privacy Controls for Modern Data Stacks: A Complete Overview

Privacy Controls for Modern Data Stacks: A Complete Overview It’s nearly impossible to participate...

Governance & Security
Implementing Row-Level Security Across Platforms

Implementing Row-Level Security Across Platforms As the use of sensitive data grows increasingly common,...

Governance & Security
How to Build a Zero Trust Policy

How to Build a Zero Trust Policy Zero trust is the future of data...

Governance & Security
What Is a Data Loss Prevention Policy?

What Is a Data Loss Prevention Policy? Data loss can trigger a cascade of...

Governance & Security
What is RBAC (Role-Based Access Control) – And is it Right For You?

What is RBAC (Role-Based Access Control) – And is it Right For You? Much...

Governance & Security
RBAC vs. ABAC Policy Management: What Data Teams Should Know

RBAC vs. ABAC Policy Management: What Data Teams Should Know No matter the type,...

Governance & Security
What is Data Access Governance?

What is Data Access Governance? At a time when vast amounts of highly sensitive...

Discovery & Classification
What is Data Classification?

What is Data Classification? Data is one of the most important assets an organization...

Discovery & Classification
How to Choose a Data Discovery Solution

How to Choose a Data Discovery Solution Data discovery may seem like a no-brainer,...

Discovery & Classification
What is Data Discovery?

What is Data Discovery? Over the past two decades, data has become an incredibly...

Intro to Data Security
Data Security Posture Management Explained

Data Security Posture Management Explained The rapid adoption of cloud-based technologies, data democratization initiatives,...

Intro to Data Security
Data Mesh Security Best Practices

Data Mesh Security Best Practices The data mesh framework places data ownership in the...

Intro to Data Security
Cloud Data Security Best Practices

Cloud Data Security Best Practices The cloud is now ubiquitous for organizations that compete...

Snowflake
Enforce Compliance & Audit Reports for Data Sharing in Snowflake

Data use agreements (DUAs) are vital to ensuring individuals’ data is used compliantly and...

Intro to Data Security
An Introduction to Data Security Solutions

An Introduction to Data Security Solutions Data use is a must-have for modern organizations...