Simplify Data Security in 3 Steps with Immuta & Concord
With 120 zettabytes of new data generated every day, it’s safe to assume that systems...
How Data Modernization Fuels Innovation at Booking.com
Maintaining the status quo has never been part of any competitive or innovative business strategy....
What Major Data Breaches Can Teach Us About Layered Security
Recent data breaches at Ticketmaster and Santander have underscored the critical vulnerabilities that exist in...
3 Steps for Countering Bias in AI/ML Data Sets
Advancements in Artificial Intelligence (AI) and Machine Learning (ML) are revolutionizing the way we work...
Snowflake Names Immuta 2024 Data Cloud Product Data Security Partner of the Year
We are thrilled to announce that Immuta has been named Snowflake’s Data Cloud Product Data...
How Snowflake’s New Horizon Features Make Your Immuta Integration Even Better
Any leading organization will tell you that data isn’t a nice-to-have – it’s table stakes...
Combining Data Mesh and Data Fabric for Next-Gen Data Security
While they may be different on a conceptual level, data fabric and data mesh aren’t...
Why Collaboration and Controls are Central to Data Risk Management
We operate in a world of risks. Whenever we get behind the wheel of a...
What the Power Grid Can Teach Us About Data Sharing
British mathematician Clive Humby is credited with coining the phrase “data is the new oil.”...
Now is the Time for Risk-Aware Data Security & Access Controls
From artificial intelligence and machine learning advancements, to decentralized cloud storage and analysis, and other...
Why Data Security is the Missing Link to Business Value
The number one performance indicator for most businesses is value. How much value will this...
Data Leaders’ Top 4 Security Trends for 2024
It’s easy to talk about trends in absolutes. “This new development will affect jobs across...
Discover Frameworks: Bridging the Gap Between Regulation & Application
“What data do we have?” Data’s entire life cycle – from collection, to analysis, to...
Immuta & Snowflake Horizon: Integrated Solutions for Data Governance Use Cases
For organizations like Thomson Reuters and Instacart, which rely on Snowflake to execute advanced analytics...
3 Emerging Data Security Laws and What They Mean for You
The past few months have been particularly hectic for lawmakers across the European Union (EU)....
The Intersection of Data Security and IAM
As more capabilities become automated as part of cloud services, we find that our customers...
How Booking.com Streamlines Snowflake & AWS Data Security
If there’s one lesson from the constant advancement of data use and technology, it’s that...
How Snowflake, phData, and Immuta Approach Data Mesh Challenges
Moving from concept to execution can be a complicated process – especially with data mesh...
Enabling Cloud Infrastructure Security for Storage & Compute
Pushes toward self-service data use, advancements in AI, and the demand for real time, granular...
The “One Policy” Approach to Policy-Based Access Management
In his Lord of the Rings series, J.R.R. Tolkien writes of 19 rings of power...
4 Simple Steps to Mature Your Data Security Strategy
In today’s digital landscape, safeguarding your data is more important than ever. Whether you’re a...
Immuta Discover Provides Accurate & Actionable Metadata for Data Security
Data is more critical than ever. Large Language Models (LLMs) and Generative AI are taking...
Report Finds Data Security is a Priority for Over 40% of CEOs
With data at the root of business-driving initiatives, the need to maintain data security and...
How to Assess and Defend Against the Cyber Threat Landscape
According to the United States’ Cybersecurity & Infrastructure Security Agency (CISA), 47% of American adults...
How Thomson Reuters’ Cloud Data Protection Unlocks Snowflake Data
As modern organizations look to innovate with agility, migrating to the cloud enables them to...
Data Security Posture Management With & Without Data Classification
Data Security Posture Management Data security has become a critical concern for organizations of all...
What is Sensitive Data and How Should I Protect It?
If you’ve done any work with data, you’ve likely heard the term “sensitive data.” Data...
Data Leak Prevention for Modern Tech Stacks
When we think of threats to data, malicious hackers who are out to profit off...
How to Mitigate Risk by Mastering Cloud Storage Security
The volume of cloud data is increasing at an exponential rate. But with this growth...
Securing Success: Immuta is Snowflake’s 2023 Data Security Partner of the Year
It’s no exaggeration to say that virtually any contemporary organization relies on data. And as...
Demystifying Data Security and Privacy in the Digital Age
As data evolves, so does the threat landscape. Facing the possibilities of targeted breaches from...
What is Data Modernization? Guiding Data into the Future
In a fast-moving field, established frameworks can often benefit from strategic updates. Think of your...
Data Mesh vs. Data Fabric: What’s the Difference?
When two different concepts sound or act alike, it can be easy to conflate them....
Bans, Breaches, and Budding Regulations: May 2023’s Key Stories
Like any fast-developing resource, the advancement of data use is subject to growing pains. As...
How Immuta’s ISO 27001/27701 Compliance is Enhancing Data Security
As the world becomes increasingly digital, data security has become a critical concern for businesses...
5 Steps for an Effective Data Breach Response
With global business and operations so heavily reliant on data collection, sharing, and analysis, data...
4 Steps to Improve Security Posture in Your Data Stack
As organizations look to migrate and optimize their data resources, cloud data platforms are continuing...
The Escalating Risk of Data Breaches: March 2023’s Key Stories
As modern organizations collect customers’ data, they assume the implicit responsibility of keeping it private...
Buzzword Bracket: Comparing Trending Terms in Data Security
In the spirit of the NCAA March Madness tournament, we’ve decided to create a competitive...
Why Data Breach Detection is Crucial for Data Security
When a data breach occurs, time is of the essence. On one level, modern compliance...
Multi-Cloud Data Security: An Overview
Why settle for one cloud when you can have a whole buffet of platforms to...
Trending Towards a Data-Fueled Future: February 2023’s Key Stories
Data-driven leaders often push boundaries to steer their organizations towards more insight-driven, impactful futures. But...
8 Reasons to Choose Immuta’s SaaS Data Security Platform
Data is the lifeblood of any organization, and keeping it secure is of the utmost...
Immuta Detect Provides Continuous Cloud Data Security Posture Management
Data Security Reflections and Predictions: December 2022’s Key Stories
As common as data use has become in modern business and government, there is always...
The 3 Most Common Data Engineering Challenges
Today’s data engineering teams face various challenges wrangling massive volumes of data, dispersed stakeholders with...
Best Practices for Data Security in Modern Cloud Platforms
As the volume of data generated, transformed, stored, and accessed has increased, digital transformation has...
What Is Privacy Engineering – And Do You Need It?
Do you have complete confidence in your organization’s privacy law compliance? If your answer is...
Why Data Monitoring is Key to Sensitive Data Protection
According to one 2022 report, 89% of companies claim that their organization is taking a...
Data Security, Attacks, and Costly Mistakes: October 2022’s Key Stories
Large-scale approaches to maintaining cloud data security are still relatively nascent for modern organizations. As...
A Multi-Pronged Approach to Cybersecurity Risk Management Frameworks
What is a Cybersecurity Risk Management Framework? The federal government’s Risk Management Framework (RMF) offers...
Data Breaches, Leaks, and Fines: September 2022’s Key Stories
Without effective and thorough data security measures, organizations take on quite a bit of unnecessary...
Data Innovation Goes Global: The Immuta All Access Tour
More data is created now than ever before. According to Statista, people around the world...
Implementing a Data Security Platform for Cloud Storage Security
As data storage and analysis continue to migrate from on-premises frameworks to those based in...
What Are the Most Common Types of Data Masking?
Data masking replaces sensitive information with fake but convincing versions of the original data. Given...
What Is Data Masking?
What Is Data Masking? Why Do I Need Data Masking? What Are Some Data Masking...
How Latch Enables Secure Self-Service Data Analytics with Immuta & Snowflake
A decade ago, having a camera on your doorbell or being able to unlock your...
Data Leaders’ Top 4 Enterprise Data Security Challenges
There’s no disputing the importance of data in driving cutting edge insights and business outcomes....
What is Data Obfuscation? Everything You Should Know
As data use has become ubiquitous, data breaches have followed suit. Though down from a...
3 Predictions for Data Security in 2022
While the pandemic’s effects are still being felt, organizations have had a chance to reflect...
Why Clarifying De-Identification Concepts is Key to Sufficient Data Protection
Data protection law emerged in the 1970’s in Europe as a means to protect against...
Immuta & Starburst Trino: Powering Faster, Safer Analytics & Data Science
Access to sensitive data is more critical to data analytics and data science than ever...
4 Reasons to Start Your Cloud Migration Process with Data Security
The vast majority of organizations now utilize the cloud in some form or another, yet...
Security Meets Privacy… in Databricks
Security is always a driving force, particularly for organizations making the move from on-premises Hadoop...
Security and Privacy Layers in Snowflake for Highly Sensitive Data
“Over the past few years, data privacy has evolved from ‘nice to have’ to a...
Differentiating Data Security in the GDPR from Privacy
The European Union’s General Data Protection Regulation — one of the most forward-leaning privacy regulations...
Homomorphic Encryption Alone Is Security, Not Privacy
I’ve seen written many times that “Privacy can be improved with techniques like differential privacy...