November 28, 2023
The “One Policy” Approach to Policy-Based Access Management

In his Lord of the Rings series, J.R.R. Tolkien writes of 19 rings of power...

July 7, 2023
Data Leak Prevention for Modern Tech Stacks

When we think of threats to data, malicious hackers who are out to profit off...

September 27, 2022
Distributed Stewardship for Data Mesh Architecture

Modern enterprises rely on data to deliver insights across every line of business, from sales...

August 19, 2022
RBAC vs. ABAC for Data Access Control Use Cases

As important as data analysis is to modern businesses, enforcing the proper access control on...

June 10, 2022
How to Comply with the Zero Trust Executive Order

Since the White House released its Executive Order (EO) on Improving the Nation’s Cybersecurity in...

May 23, 2022
What Is Purpose-Based Access Control (PBAC)?

When it comes to making decisions, context is essential. Imagine your neighbor asks for a...

April 27, 2022
What Is Policy-Based Access Control?

In daily conversation, we often use umbrella terms to simplify communication. For instance, if someone...

April 6, 2022
The Costs of Cloud-Based Access Control: DIY vs. Automated

Organizations are shifting from on-premises data storage to the cloud, with the goal of profiting...

March 4, 2022
SaaS Data Security: Faster, More Flexible Data Access Control

As cloud adoption accelerates, SaaS-based products have also exploded to fill the agility, scalability, and...

February 22, 2022
What is ABAC? Attribute-Based Access Control 101

There’s a lot of confusion in the market about attribute-based access control (ABAC) and what it actually...

3 Best Practices for Maximizing Data Management Efficiency
January 20, 2022
3 Best Practices for Maximizing Data Management Efficiency

In 2020, global spending on cloud data services reached $312 billion. In 2022, Gartner estimates...

Understanding Differential Data Privacy
December 20, 2021
Automated Policy Enforcement is the Key to Self-Service Analytics

Data can deliver an important strategic advantage — if organizations can make it simple and...

November 12, 2021
Why a Data Management Framework is Essential

Is it possible to manage a successful business or organization if you’re not successfully managing...

September 20, 2021
Modernizing From an RBAC to ABAC Model: Is It Hard?

The good news is no. The better news is you are already 90% of the...

September 17, 2021
Cloud Data Security: A Complete Overview

With cloud data platforms becoming the most common way for companies to store and access...

June 12, 2021
Maximize Financial Data Security with Immuta

For more than 160 years, Credit Suisse has been providing customers with best-in-class wealth management,...

April 13, 2021
3 Automated Privacy Controls in Databricks Using Immuta

The data your company collects is one of its most valuable assets. And yet, at...

March 17, 2021
What is Fine-Grained Access Control? (And Why It’s So Important)

One of the most traditional methods of determining who can and cannot access certain data...

March 10, 2021
Dogfooding Data Access Control

Data access control: quixotic enterprise initiative, or the top priority of a startup’s first data...

October 16, 2020
Role-Based Access Control vs. Attribute-Based Access Control

The terms role-based access control and attribute-based access control are well known, but not necessarily well understood — or...

January 28, 2019
Data Governance Anti-Patterns: Stop Conflating Who, Why, and What

(This Is Part II of Our “Data Governance Anti-Patterns Series”, Part I Can Be Found Here)....