June 6, 2023
What is Data Modernization? Guiding Data into the Future

In a fast-moving field, established frameworks can often benefit from strategic updates. Think of your...

May 31, 2023
Data Mesh vs. Data Fabric: What’s the Difference?

When two different concepts sound or act alike, it can be easy to conflate them....

May 24, 2023
Bans, Breaches, and Budding Regulations: May 2023’s Key Stories

Like any fast-developing resource, the advancement of data use is subject to growing pains. As...

May 22, 2023
How Immuta’s ISO 27001/27701 Compliance is Enhancing Data Security

As the world becomes increasingly digital, data security has become a critical concern for businesses...

May 16, 2023
5 Steps for an Effective Data Breach Response

With global business and operations so heavily reliant on data collection, sharing, and analysis, data...

April 13, 2023
4 Steps to Improve Security Posture in Your Data Stack

As organizations look to migrate and optimize their data resources, cloud data platforms are continuing...

March 29, 2023
The Escalating Risk of Data Breaches: March 2023’s Key Stories

As modern organizations collect customers’ data, they assume the implicit responsibility of keeping it private...

March 29, 2023
Buzzword Bracket: Comparing Trending Terms in Data Security

In the spirit of the NCAA March Madness tournament, we’ve decided to create a competitive...

March 17, 2023
Why Data Breach Detection is Crucial for Data Security

When a data breach occurs, time is of the essence. On one level, modern compliance...

March 6, 2023
Multi-Cloud Data Security: An Overview

Why settle for one cloud when you can have a whole buffet of platforms to...

February 22, 2023
Trending Towards a Data-Fueled Future: February 2023’s Key Stories

Data-driven leaders often push boundaries to steer their organizations towards more insight-driven, impactful futures. But...

Understanding Differential Data Privacy
February 13, 2023
8 Reasons to Choose Immuta’s SaaS Data Security Platform

Data is the lifeblood of any organization, and keeping it secure is of the utmost...

Immuta Detect Risk Scoring
January 18, 2023
Immuta Detect Provides Continuous Cloud Data Security Posture Management
December 19, 2022
Data Security Reflections and Predictions: December 2022’s Key Stories

As common as data use has become in modern business and government, there is always...

December 12, 2022
Survey Reveals The 3 Most Common Data Engineering Challenges

Data teams are critical to the success of modern data-driven organizations. Made up of engineers,...

November 30, 2022
Best Practices for Data Security in Modern Cloud Platforms

As the volume of data generated, transformed, stored, and accessed has increased, digital transformation has...

November 29, 2022
Privacy Engineering’s Emerging Role in the Future of Data Security

Organizations want to be data-driven, but the question of how to do so is still...

October 28, 2022
Why Data Monitoring is Key to Sensitive Data Protection

According to one 2022 report, 89% of companies claim that their organization is taking a...

October 26, 2022
Data Security, Attacks, and Costly Mistakes: October 2022’s Key Stories

Large-scale approaches to maintaining cloud data security are still relatively nascent for modern organizations. As...

October 14, 2022
A Multi-Pronged Approach to Cybersecurity Risk Management Frameworks

What is a Cybersecurity Risk Management Framework? The federal government’s Risk Management Framework (RMF) offers...

Unlocked
October 4, 2022
Data Breaches, Leaks, and Fines: September 2022’s Key Stories

Without effective and thorough data security measures, organizations take on quite a bit of unnecessary...

September 30, 2022
Data Innovation Goes Global: The Immuta All Access Tour

More data is created now than ever before. According to Statista, people around the world...

June 10, 2022
How to Comply with the Zero Trust Executive Order

A year after the White House released its Executive Order (EO) on Improving the Nation’s...

May 13, 2022
What Are the Most Common Types of Data Masking?

What Are the Most Common Types of Data Masking? Data masking is a type of...

Masking of Data
May 10, 2022
What Is Data Masking?

What Is Data Masking? Why Do I Need Data Masking? What Are Some Data Masking...

May 9, 2022
How Latch Enables Secure Self-Service Data Analytics with Immuta & Snowflake

A decade ago, having a camera on your doorbell or being able to unlock your...

Enterprise Data Security Challenges
April 26, 2022
Data Leaders’ Top 4 Enterprise Data Security Challenges

There’s no disputing the importance of data in driving cutting edge insights and business outcomes....

January 27, 2022
What is Data Obfuscation? Everything You Should Know

As data use has become ubiquitous in recent years, data breaches have followed suit. In...

December 13, 2021
3 Predictions for Data Security in 2022

While the pandemic’s effects are still being felt, organizations have had a chance to reflect...

April 29, 2021
Why Clarifying De-Identification Concepts is Key to Sufficient Data Protection

Data protection law emerged in the 1970’s in Europe as a means to protect against...

November 12, 2020
Immuta & Starburst Trino: Powering Faster, Safer Analytics & Data Science

Access to sensitive data is more critical to data analytics and data science than ever...

Cloud Migration Process
September 25, 2020
4 Reasons to Start Your Cloud Migration Process with Data Security

The vast majority of organizations now utilize the cloud in some form or another, yet...

May 14, 2020
Security Meets Privacy… in Databricks

Security is always a driving force, particularly for organizations making the move from on-premises Hadoop...

May 6, 2020
Security and Privacy Layers in Snowflake for Highly Sensitive Data

“Over the past few years, data privacy has evolved from ‘nice to have’ to a...

Homomorphic Encryption
September 14, 2018
Homomorphic Encryption Alone Is Security, Not Privacy

I’ve seen written many times that “Privacy can be improved with techniques like differential privacy...