December 8, 2023
What Is the EU-US Data Privacy Framework & How Should You Plan?

The General Data Protection Regulation (GDPR) is one of the most wide-reaching and stringent data...

June 20, 2023
Demystifying Data Security and Privacy in the Digital Age

As data evolves, so does the threat landscape. Facing the possibilities of targeted breaches from...

June 14, 2023
Updating Australian Privacy Law: The Big Shift

On February 16, 2023, Australia’s Attorney-General’s Department (AGD) publicised its Review Report, the latest output...

March 29, 2023
The Escalating Risk of Data Breaches: March 2023’s Key Stories

As modern organizations collect customers’ data, they assume the implicit responsibility of keeping it private...

January 26, 2023
Data Privacy Provisions and Penalties: January 2023’s Key Stories

Effective data security is standard for any modern data-driven business or agency. But as data...

November 29, 2022
Privacy Engineering’s Emerging Role in the Future of Data Security

Organizations want to be data-driven, but figuring out how to do so is often far...

May 13, 2022
What is Data Tokenization and Why is it Important?

What Is Data Tokenization? Why Is Data Tokenization Important for Data Security? When Should I...

October 18, 2021
Understanding Differential Privacy

Collecting and analyzing aggregated data is essential in today’s connected world, but are you doing...

August 30, 2021
Gartner Hype Cycle for Privacy, 2021

News of data leaks and breaches seems to be increasingly common. While this trend is...

June 23, 2021
Data Owners: Privacy is YOUR Problem

Data has been called “the new gold” for its ability to transform and automate business...

May 5, 2021
How AstrumU Maximizes Data Privacy & Utility with Immuta & Databricks

Kaj Pedersen, Chief Technical Officer at AstrumU, joined Immuta and Databricks at a recent Amazon...

April 29, 2021
Why Clarifying De-Identification Concepts is Key to Sufficient Data Protection

Data protection law emerged in the 1970’s in Europe as a means to protect against...

April 13, 2021
3 Automated Privacy Controls in Databricks Using Immuta

The data your company collects is one of its most valuable assets. And yet, at...

August 26, 2020
How k-Anonymization Makes Sensitive Data Use More Secure

A few years removed from the peak of the pandemic, we’re still understanding COVID-19’s impact...

A Call for a Risk-Based Assessment of Anonymization Approaches
August 24, 2020
A Call for a Risk-Based Assessment of Anonymization Approaches

Why it’s time to reexamine the binary dichotomy between personal and aggregate data, and what...

June 22, 2020
Secure Data Collaboration, Privacy, and Compliance for Databricks

Databricks shops are expanding their analytical use cases, and, in the process, bringing more sensitive...

July 22, 2019
Why a Data Privacy Compliance Journey Should Start with Privacy by Design

Global interest in privacy has led to a recent explosion in privacy-centric legislation. Consequently, organizations...

December 19, 2018
Differentiating Data Security in the GDPR from Privacy

The European Union’s General Data Protection Regulation — one of the most forward-leaning privacy regulations...

April 12, 2016
Data Privacy & Data Science: The Next Generation of Data Experimentation

Collection of consumer data is mainstream and global. The generally accepted premise of the big...