The “One Policy” Approach to Policy-Based Access Management
In his Lord of the Rings series, J.R.R. Tolkien writes of 19 rings of power...
Data Leak Prevention for Modern Tech Stacks
When we think of threats to data, malicious hackers who are out to profit off...
Distributed Stewardship for Data Mesh Architecture
Modern enterprises rely on data to deliver insights across every line of business, from sales...
RBAC vs. ABAC for Data Access Control Use Cases
As important as data analysis is to modern businesses, enforcing the proper access control on...
How to Comply with the Zero Trust Executive Order
Since the White House released its Executive Order (EO) on Improving the Nation’s Cybersecurity in...
What Is Purpose-Based Access Control (PBAC)?
When it comes to making decisions, context is essential. Imagine your neighbor asks for a...
What Is Policy-Based Access Control?
In daily conversation, we often use umbrella terms to simplify communication. For instance, if someone...
The Costs of Cloud-Based Access Control: DIY vs. Automated
It’s no surprise that nearly 90% of organizations rely on a multi-cloud strategy to get...
SaaS Data Security: Faster, More Flexible Data Access Control
As cloud adoption accelerates, SaaS-based products have also exploded to fill the agility, scalability, and...
What is ABAC? Attribute-Based Access Control 101
There’s a lot of confusion in the market about attribute-based access control (ABAC) and what it actually...
3 Best Practices for Maximizing Data Management Efficiency
In 2020, global spending on cloud data services reached $312 billion. In 2022, Gartner estimates...
Automated Policy Enforcement is the Key to Self-Service Analytics
Data can deliver an important strategic advantage — if organizations can make it simple and...
Why a Data Management Framework is Essential
Is it possible to manage a successful business or organization if you’re not successfully managing...
Modernizing From an RBAC to ABAC Model: Is It Hard?
The good news is no. The better news is you are already 90% of the...
Cloud Data Security: A Complete Overview
With cloud data platforms becoming the most common way for companies to store and access...
Maximize Financial Data Security with Immuta
For more than 160 years, Credit Suisse has been providing customers with best-in-class wealth management,...
3 Automated Privacy Controls in Databricks Using Immuta
The data your company collects is one of its most valuable assets. And yet, at...
What is Fine-Grained Access Control? (And Why It’s So Important)
One of the most traditional methods of determining who can and cannot access certain data...
Dogfooding Data Access Control
Data access control: quixotic enterprise initiative, or the top priority of a startup’s first data...
Role-Based Access Control vs. Attribute-Based Access Control
The terms role-based access control and attribute-based access control are well known, but not necessarily well understood — or...
Data Governance Anti-Patterns: Stop Conflating Who, Why, and What
(This Is Part II of Our “Data Governance Anti-Patterns Series”, Part I Can Be Found Here)....