
The “One Policy” Approach to Policy-Based Access Management
In his Lord of the Rings series, J.R.R. Tolkien writes of 19 rings of power...

Enabling Cloud Infrastructure Security for Storage & Compute
Pushes toward self-service data use, advancements in AI, and the demand for real time, granular...

4 Simple Steps to Mature Your Data Security Strategy
In today’s digital landscape, safeguarding your data is more important than ever. Whether you’re a...

Immuta Discover Provides Accurate & Actionable Metadata for Data Security
Data is more critical than ever. Large Language Models (LLMs) and Generative AI are taking...

Report Finds Data Security is a Priority for Over 40% of CEOs
With data at the root of business-driving initiatives, the need to maintain data security and...

How to Assess and Defend Against the Cyber Threat Landscape
According to the United States’ Cybersecurity & Infrastructure Security Agency (CISA), 47% of American adults...

How Thomson Reuters’ Cloud Data Protection Unlocks Snowflake Data
As modern organizations look to innovate with agility, migrating to the cloud enables them to...

Data Security Posture Management With & Without Data Classification
Data Security Posture Management Data security has become a critical concern for organizations of all...

What is Sensitive Data and How Should I Protect It?
If you’ve done any work with data, you’ve likely heard the term “sensitive data.” Data...

Data Leak Prevention for Modern Tech Stacks
When we think of threats to data, malicious hackers who are out to profit off...

How to Mitigate Risk by Mastering Cloud Storage Security
The volume of cloud data is increasing at an exponential rate. But with this growth...

Securing Success: Immuta is Snowflake’s 2023 Data Security Partner of the Year
It’s no exaggeration to say that virtually any contemporary organization relies on data. And as...

Demystifying Data Security and Privacy in the Digital Age
As data evolves, so does the threat landscape. Facing the possibilities of targeted breaches from...

What is Data Modernization? Guiding Data into the Future
In a fast-moving field, established frameworks can often benefit from strategic updates. Think of your...

Data Mesh vs. Data Fabric: What’s the Difference?
When two different concepts sound or act alike, it can be easy to conflate them....

Bans, Breaches, and Budding Regulations: May 2023’s Key Stories
Like any fast-developing resource, the advancement of data use is subject to growing pains. As...

How Immuta’s ISO 27001/27701 Compliance is Enhancing Data Security
As the world becomes increasingly digital, data security has become a critical concern for businesses...

5 Steps for an Effective Data Breach Response
With global business and operations so heavily reliant on data collection, sharing, and analysis, data...

4 Steps to Improve Security Posture in Your Data Stack
As organizations look to migrate and optimize their data resources, cloud data platforms are continuing...

The Escalating Risk of Data Breaches: March 2023’s Key Stories
As modern organizations collect customers’ data, they assume the implicit responsibility of keeping it private...

Buzzword Bracket: Comparing Trending Terms in Data Security
In the spirit of the NCAA March Madness tournament, we’ve decided to create a competitive...

Why Data Breach Detection is Crucial for Data Security
When a data breach occurs, time is of the essence. On one level, modern compliance...

Multi-Cloud Data Security: An Overview
Why settle for one cloud when you can have a whole buffet of platforms to...

Trending Towards a Data-Fueled Future: February 2023’s Key Stories
Data-driven leaders often push boundaries to steer their organizations towards more insight-driven, impactful futures. But...

8 Reasons to Choose Immuta’s SaaS Data Security Platform
Data is the lifeblood of any organization, and keeping it secure is of the utmost...

Immuta Detect Provides Continuous Cloud Data Security Posture Management

Data Security Reflections and Predictions: December 2022’s Key Stories
As common as data use has become in modern business and government, there is always...

Survey Reveals The 3 Most Common Data Engineering Challenges
Data teams are critical to the success of modern data-driven organizations. Made up of engineers,...

Best Practices for Data Security in Modern Cloud Platforms
As the volume of data generated, transformed, stored, and accessed has increased, digital transformation has...

Privacy Engineering’s Emerging Role in the Future of Data Security
Organizations want to be data-driven, but the question of how to do so is still...

Why Data Monitoring is Key to Sensitive Data Protection
According to one 2022 report, 89% of companies claim that their organization is taking a...

Data Security, Attacks, and Costly Mistakes: October 2022’s Key Stories
Large-scale approaches to maintaining cloud data security are still relatively nascent for modern organizations. As...

A Multi-Pronged Approach to Cybersecurity Risk Management Frameworks
What is a Cybersecurity Risk Management Framework? The federal government’s Risk Management Framework (RMF) offers...

Data Breaches, Leaks, and Fines: September 2022’s Key Stories
Without effective and thorough data security measures, organizations take on quite a bit of unnecessary...

Data Innovation Goes Global: The Immuta All Access Tour
More data is created now than ever before. According to Statista, people around the world...

Implementing a Data Security Platform for Cloud Storage Security
As data storage and analysis continue to migrate from on-premises frameworks to those based in...

How to Comply with the Zero Trust Executive Order
A year after the White House released its Executive Order (EO) on Improving the Nation’s...

What Are the Most Common Types of Data Masking?
What Are the Most Common Types of Data Masking? Data masking is a type of...

What Is Data Masking?
What Is Data Masking? Why Do I Need Data Masking? What Are Some Data Masking...

How Latch Enables Secure Self-Service Data Analytics with Immuta & Snowflake
A decade ago, having a camera on your doorbell or being able to unlock your...

Data Leaders’ Top 4 Enterprise Data Security Challenges
There’s no disputing the importance of data in driving cutting edge insights and business outcomes....

What is Data Obfuscation? Everything You Should Know
As data use has become ubiquitous in recent years, data breaches have followed suit. In...

3 Predictions for Data Security in 2022
While the pandemic’s effects are still being felt, organizations have had a chance to reflect...

Why Clarifying De-Identification Concepts is Key to Sufficient Data Protection
Data protection law emerged in the 1970’s in Europe as a means to protect against...

Immuta & Starburst Trino: Powering Faster, Safer Analytics & Data Science
Access to sensitive data is more critical to data analytics and data science than ever...

4 Reasons to Start Your Cloud Migration Process with Data Security
The vast majority of organizations now utilize the cloud in some form or another, yet...

Security Meets Privacy… in Databricks
Security is always a driving force, particularly for organizations making the move from on-premises Hadoop...

Security and Privacy Layers in Snowflake for Highly Sensitive Data
“Over the past few years, data privacy has evolved from ‘nice to have’ to a...

Differentiating Data Security in the GDPR from Privacy
The European Union’s General Data Protection Regulation — one of the most forward-leaning privacy regulations...

Homomorphic Encryption Alone Is Security, Not Privacy
I’ve seen written many times that “Privacy can be improved with techniques like differential privacy...