![](https://www.immuta.com/wp-content/uploads/2021/02/Cover-Image-Tennis.jpg)
What is Data Obfuscation? Everything You Should Know
As data use has become ubiquitous, data breaches have followed suit. Though down from a...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_136@2x.png)
Why Clarifying De-Identification Concepts is Key to Sufficient Data Protection
Data protection law emerged in the 1970’s in Europe as a means to protect against...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_161@2x.png)
How to: Automating Privacy Control in Databricks Using Immuta
“Over the past few years, data privacy has evolved from ‘nice to have’ to a...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_138@2x-825x300-1.png)
Automate HIPAA De-identification Methods on Amazon RDS
Data engineers and product managers are often responsible for implementing various controls and audit capabilities...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_54@2x-1.png)
Identity & Access Control Management for Public Sector
Immuta was founded in 2015 in response to the U.S. Intelligence Community’s (IC’s) complex and...