July 7, 2023
Data Leak Prevention for Modern Tech Stacks

When we think of threats to data, malicious hackers who are out to profit off...

June 29, 2022
Data Masking vs. Tokenization: What’s the Difference?

Data protection measures are only as strong as their ability to outsmart increasingly advanced technology...

June 8, 2022
How to Mask Sensitive Financial Data with Databricks and Immuta

As data moves among the storage, compute, and analysis layers of a data stack, there...

May 18, 2022
What Are Data Masking Best Practices?

What Is Data Masking? Before diving into best practices for data masking, it’s integral to...

May 13, 2022
What is Data Tokenization and Why is it Important?

What Is Data Tokenization? Why Is Data Tokenization Important for Data Security? When Should I...

May 13, 2022
How to Define a Data Masking Standard for Compliant Analytics

What Are Common Data Masking Techniques? How Should I Define a Data Masking Standard for...

May 13, 2022
What Are the Most Common Types of Data Masking?

Data masking replaces sensitive information with fake but convincing versions of the original data. Given...

Masking of Data
May 10, 2022
What Is Data Masking?

What Is Data Masking? Why Do I Need Data Masking? What Are Some Data Masking...

March 22, 2022
Data Buzzwords: 15 Trending Terms to Know

The world of data is full of interesting language, complex terms, and more acronyms than...

January 27, 2022
What is Data Obfuscation? Everything You Should Know

As data use has become ubiquitous, data breaches have followed suit. Though down from a...

November 12, 2021
Why a Data Management Framework is Essential

Is it possible to manage a successful business or organization if you’re not successfully managing...

Understanding Differential Data Privacy
October 18, 2021
Understanding Differential Data Privacy

In today’s day and age, we’re accustomed to technological advances and capabilities being uncovered all...

September 17, 2021
Cloud Data Security: A Complete Overview

With cloud data platforms becoming the most common way for companies to store and access...

June 28, 2021
What Is Data Redaction?

There’s an old adage that all press is good press, but one kind of attention...

June 12, 2021
Maximize Financial Data Security with Immuta

For more than 160 years, Credit Suisse has been providing customers with best-in-class wealth management,...

Data Masking Tools and Solutions: 2022 Buyer’s Guide
June 10, 2021
Data Masking Tools and Solutions

Data masking is one of the most important tasks in data governance. It may seem...

June 8, 2021
What is Data Generalization? A Complete Overview

Data generalization is the process of creating a more broad categorization of data in a...

May 7, 2021
What is Data De-identification and Why is It Important?

Data de-identification is a form of dynamic data masking that refers to breaking the link between data...

April 14, 2021
Everything You Need to Know About K-Anonymity

Businesses and organizations hold more personal data now than ever before. In general, this data...

March 17, 2021
Immuta Introduces Support for Databricks SQL Analytics & Google Cloud

Immuta and Databricks have deepened our strategic partnership and augmented our native product integration by announcing Immuta’s...

March 12, 2021
5 Tools for Secure Data Analytics in Okta

More organizations than ever are leveraging the power of multiple cloud data platforms for business-driving...

February 5, 2021
What is Differential Privacy? A Guide for Data Teams

In today’s day and age, we’re accustomed to technological advances and capabilities being uncovered all...

August 26, 2020
How k-Anonymization Makes Sensitive Data Use More Secure

A few years removed from the peak of the pandemic, we’re still understanding COVID-19’s impact...

May 11, 2020
Automate HIPAA De-identification Methods on Amazon RDS

Data engineers and product managers are often responsible for implementing various controls and audit capabilities...