Fine-Grained Authorization: Data Security with Precision
Fine-Grained Authorization: Data Security with Precision When we think of the term “authorization,” physical...
Implementing Snowflake Column-Level Security for PII & PHI
As sensitive data, like personally identifiable information (PII) and protected health information (PHI), becomes...
How to Scale Cross-Organization Snowflake Data Sharing
In this blog, you’ll learn about: Snowflake data shares Considerations and complexities that can...
How to Implement Immuta Within Alation
Immuta is the modern data security platform that gives you the power to leverage...
Immuta & Snowflake for Data Mesh Federated Governance
Immuta & Snowflake for Data Mesh Federated Governance In this demo, Immuta CTO Steve...
Enforcing Redshift Attribute-Based Access Control
Organizations are increasingly adopting data lakehouse architectures to reap the benefits of added flexibility,...
How to Use Immuta’s Integration with Databricks Unity Catalog
How to Use Immuta’s Integration with Databricks Unity Catalog Immuta is the first Data...
How to Implement Databricks Data Masking Across Platforms
As cloud data platform adoption accelerates and organizations become more reliant on data, teams...
How to Anonymize Data with Databricks Access Control
Organizations with large workforces are increasingly analyzing employee data using cloud data platforms such...
How to Manage Snowflake Fine-Grained Access Control
If Disney World were a database, we would rave about its access control strategy....
How to Implement Snowflake Data Masking Across Platforms
As cloud data platform adoption accelerates and organizations become more reliant on data, teams...
How to Implement Row-Level Security in Snowflake
Segmenting data by geographies is a common requirement for row access policies in Snowflake....
How To Enable Snowflake Attribute-Based Access Control
Cloud data platforms such as Snowflake provide native security and data access controls engineered for platform-specific administrators to...
Cloud SIEM: A Blueprint for Proactive Monitoring & Response
Cloud SIEM: A Blueprint for Proactive Monitoring & Response When a data breach occurs,...
What Is Managed Detection and Response?
What Is Managed Detection and Response? Modern hybrid and multi-cloud environments are complex, making...
Insider Risk Management: What CISOs Need to Know
Insider Risk Management: What CISOs Need to Know One of the most significant threats...
Data Risk Management 101
Data Risk Management 101 Security breaches and cyberattacks have become all too common in...
How to Build an Audit Logging and Monitoring Policy
How to Build an Audit Logging and Monitoring Policy According to IBM’s 2022 Cost...
What User Behavior Analytics Can Tell You About Data Threats
What User Behavior Analytics Can Tell You About Data Threats Behavioral analytics has long...
A Guide to Data Compliance Regulations
A Guide to Data Compliance Regulations As with data resources and platforms, data regulations...
Data Observability vs. Data Detection
Data Observability vs. Data Detection The modern data stack is continually evolving, and confusion...
Privacy Controls for Modern Data Stacks: A Complete Overview
Privacy Controls for Modern Data Stacks: A Complete Overview It’s nearly impossible to participate...
Implementing Row-Level Security Across Platforms
Implementing Row-Level Security Across Platforms As the use of sensitive data grows increasingly common,...
How to Build a Zero Trust Policy
How to Build a Zero Trust Policy Zero trust is the future of data...
What Is a Data Loss Prevention Policy?
What Is a Data Loss Prevention Policy? Data loss can trigger a cascade of...
What is RBAC (Role-Based Access Control) – And is it Right For You?
What is RBAC (Role-Based Access Control) – And is it Right For You? Much...
RBAC vs. ABAC Policy Management: What Data Teams Should Know
RBAC vs. ABAC Policy Management: What Data Teams Should Know No matter the type,...
What is Data Access Governance?
What is Data Access Governance? At a time when vast amounts of highly sensitive...
What is Data Classification?
What is Data Classification? Data is one of the most important assets an organization...
How to Choose a Data Discovery Solution
How to Choose a Data Discovery Solution Data discovery may seem like a no-brainer,...
What is Data Discovery?
What is Data Discovery? Over the past two decades, data has become an incredibly...
Data Security Posture Management Explained
Data Security Posture Management Explained The rapid adoption of cloud-based technologies, data democratization initiatives,...
Data Mesh Security Best Practices
Data Mesh Security Best Practices The data mesh framework places data ownership in the...
Cloud Data Security Best Practices
Cloud Data Security Best Practices The cloud is now ubiquitous for organizations that compete...
Enforce Compliance & Audit Reports for Data Sharing in Snowflake
Data use agreements (DUAs) are vital to ensuring individuals’ data is used compliantly and...
An Introduction to Data Security Solutions
An Introduction to Data Security Solutions Data use is a must-have for modern organizations...