April 9, 2024
Why Data Security is the Missing Link to Business Value

The number one performance indicator for most businesses is value. How much value will this...

March 14, 2024
Data Leaders’ Top 4 Security Trends for 2024

It’s easy to talk about trends in absolutes. “This new development will affect jobs across...

February 28, 2024
Discover Frameworks: Bridging the Gap Between Regulation & Application

“What data do we have?” Data’s entire life cycle – from collection, to analysis, to...

January 30, 2024
Immuta & Snowflake Horizon: Integrated Solutions for Data Governance Use Cases

For organizations like Thomson Reuters and Instacart, which rely on Snowflake to execute advanced analytics...

January 17, 2024
3 Emerging Data Security Laws and What They Mean for You

The past few months have been particularly hectic for lawmakers across the European Union (EU)....

January 11, 2024
The Intersection of Data Security and IAM

As more capabilities become automated as part of cloud services, we find that our customers...

December 22, 2023
How Booking.com Streamlines Snowflake & AWS Data Security

If there’s one lesson from the constant advancement of data use and technology, it’s that...

December 19, 2023
How Snowflake, phData, and Immuta Approach Data Mesh Challenges

Moving from concept to execution can be a complicated process – especially with data mesh...

November 28, 2023
Enabling Cloud Infrastructure Security for Storage & Compute

Pushes toward self-service data use, advancements in AI, and the demand for real time, granular...

November 28, 2023
The “One Policy” Approach to Policy-Based Access Management

In his Lord of the Rings series, J.R.R. Tolkien writes of 19 rings of power...

November 9, 2023
4 Simple Steps to Mature Your Data Security Strategy

In today’s digital landscape, safeguarding your data is more important than ever. Whether you’re a...

October 30, 2023
Immuta Discover Provides Accurate & Actionable Metadata for Data Security

Data is more critical than ever. Large Language Models (LLMs) and Generative AI are taking...

September 11, 2023
Report Finds Data Security is a Priority for Over 40% of CEOs

With data at the root of business-driving initiatives, the need to maintain data security and...

July 31, 2023
How to Assess and Defend Against the Cyber Threat Landscape

According to the United States’ Cybersecurity & Infrastructure Security Agency (CISA), 47% of American adults...

July 24, 2023
How Thomson Reuters’ Cloud Data Protection Unlocks Snowflake Data

As modern organizations look to innovate with agility, migrating to the cloud enables them to...

Understanding Differential Data Privacy
July 21, 2023
Data Security Posture Management With & Without Data Classification

Data Security Posture Management Data security has become a critical concern for organizations of all...

July 11, 2023
What is Sensitive Data and How Should I Protect It?

If you’ve done any work with data, you’ve likely heard the term “sensitive data.” Data...

July 7, 2023
Data Leak Prevention for Modern Tech Stacks

When we think of threats to data, malicious hackers who are out to profit off...

July 3, 2023
How to Mitigate Risk by Mastering Cloud Storage Security

The volume of cloud data is increasing at an exponential rate. But with this growth...

June 27, 2023
Securing Success: Immuta is Snowflake’s 2023 Data Security Partner of the Year

It’s no exaggeration to say that virtually any contemporary organization relies on data. And as...

June 20, 2023
Demystifying Data Security and Privacy in the Digital Age

As data evolves, so does the threat landscape. Facing the possibilities of targeted breaches from...

June 6, 2023
What is Data Modernization? Guiding Data into the Future

In a fast-moving field, established frameworks can often benefit from strategic updates. Think of your...

May 31, 2023
Data Mesh vs. Data Fabric: What’s the Difference?

When two different concepts sound or act alike, it can be easy to conflate them....

May 24, 2023
Bans, Breaches, and Budding Regulations: May 2023’s Key Stories

Like any fast-developing resource, the advancement of data use is subject to growing pains. As...

May 22, 2023
How Immuta’s ISO 27001/27701 Compliance is Enhancing Data Security

As the world becomes increasingly digital, data security has become a critical concern for businesses...

May 16, 2023
5 Steps for an Effective Data Breach Response

With global business and operations so heavily reliant on data collection, sharing, and analysis, data...

April 13, 2023
4 Steps to Improve Security Posture in Your Data Stack

As organizations look to migrate and optimize their data resources, cloud data platforms are continuing...

March 29, 2023
The Escalating Risk of Data Breaches: March 2023’s Key Stories

As modern organizations collect customers’ data, they assume the implicit responsibility of keeping it private...

March 29, 2023
Buzzword Bracket: Comparing Trending Terms in Data Security

In the spirit of the NCAA March Madness tournament, we’ve decided to create a competitive...

March 17, 2023
Why Data Breach Detection is Crucial for Data Security

When a data breach occurs, time is of the essence. On one level, modern compliance...

March 6, 2023
Multi-Cloud Data Security: An Overview

Why settle for one cloud when you can have a whole buffet of platforms to...

February 22, 2023
Trending Towards a Data-Fueled Future: February 2023’s Key Stories

Data-driven leaders often push boundaries to steer their organizations towards more insight-driven, impactful futures. But...

Understanding Differential Data Privacy
February 13, 2023
8 Reasons to Choose Immuta’s SaaS Data Security Platform

Data is the lifeblood of any organization, and keeping it secure is of the utmost...

Immuta Detect Risk Scoring
January 18, 2023
Immuta Detect Provides Continuous Cloud Data Security Posture Management
December 19, 2022
Data Security Reflections and Predictions: December 2022’s Key Stories

As common as data use has become in modern business and government, there is always...

December 12, 2022
The 3 Most Common Data Engineering Challenges

Today’s data engineering teams face various challenges wrangling massive volumes of data, dispersed stakeholders with...

November 30, 2022
Best Practices for Data Security in Modern Cloud Platforms

As the volume of data generated, transformed, stored, and accessed has increased, digital transformation has...

November 29, 2022
Privacy Engineering’s Emerging Role in the Future of Data Security

Organizations want to be data-driven, but figuring out how to do so is often far...

October 28, 2022
Why Data Monitoring is Key to Sensitive Data Protection

According to one 2022 report, 89% of companies claim that their organization is taking a...

October 26, 2022
Data Security, Attacks, and Costly Mistakes: October 2022’s Key Stories

Large-scale approaches to maintaining cloud data security are still relatively nascent for modern organizations. As...

October 14, 2022
A Multi-Pronged Approach to Cybersecurity Risk Management Frameworks

What is a Cybersecurity Risk Management Framework? The federal government’s Risk Management Framework (RMF) offers...

Unlocked
October 4, 2022
Data Breaches, Leaks, and Fines: September 2022’s Key Stories

Without effective and thorough data security measures, organizations take on quite a bit of unnecessary...

September 30, 2022
Data Innovation Goes Global: The Immuta All Access Tour

More data is created now than ever before. According to Statista, people around the world...

July 8, 2022
Implementing a Data Security Platform for Cloud Storage Security

As data storage and analysis continue to migrate from on-premises frameworks to those based in...

May 13, 2022
What Are the Most Common Types of Data Masking?

Data masking replaces sensitive information with fake but convincing versions of the original data. Given...

Masking of Data
May 10, 2022
What Is Data Masking?

What Is Data Masking? Why Do I Need Data Masking? What Are Some Data Masking...

May 9, 2022
How Latch Enables Secure Self-Service Data Analytics with Immuta & Snowflake

A decade ago, having a camera on your doorbell or being able to unlock your...

Enterprise Data Security Challenges
April 26, 2022
Data Leaders’ Top 4 Enterprise Data Security Challenges

There’s no disputing the importance of data in driving cutting edge insights and business outcomes....

January 27, 2022
What is Data Obfuscation? Everything You Should Know

As data use has become ubiquitous, data breaches have followed suit. Though down from a...

December 13, 2021
3 Predictions for Data Security in 2022

While the pandemic’s effects are still being felt, organizations have had a chance to reflect...

April 29, 2021
Why Clarifying De-Identification Concepts is Key to Sufficient Data Protection

Data protection law emerged in the 1970’s in Europe as a means to protect against...

November 12, 2020
Immuta & Starburst Trino: Powering Faster, Safer Analytics & Data Science

Access to sensitive data is more critical to data analytics and data science than ever...

Cloud Migration Process
September 25, 2020
4 Reasons to Start Your Cloud Migration Process with Data Security

The vast majority of organizations now utilize the cloud in some form or another, yet...

May 14, 2020
Security Meets Privacy… in Databricks

Security is always a driving force, particularly for organizations making the move from on-premises Hadoop...

May 6, 2020
Security and Privacy Layers in Snowflake for Highly Sensitive Data

“Over the past few years, data privacy has evolved from ‘nice to have’ to a...

December 19, 2018
Differentiating Data Security in the GDPR from Privacy

The European Union’s General Data Protection Regulation — one of the most forward-leaning privacy regulations...

Homomorphic Encryption
September 14, 2018
Homomorphic Encryption Alone Is Security, Not Privacy

I’ve seen written many times that “Privacy can be improved with techniques like differential privacy...