April 17, 2024
Implementing Privacy Controls for Genomics

Genomic data holds significant promise in advancing personalized medicine, streamlining disease treatments, and improving health...

April 9, 2024
Why Data Security is the Missing Link to Business Value

The number one performance indicator for most businesses is value. How much value will this...

March 6, 2024
Enhancing Databricks Unity Catalog for Evolving Data & AI Governance

In the 2024 State of Data Security Report, a vast majority (88%) of data professionals...

January 30, 2024
How to Make Data Mesh a Reality: An Implementation Roadmap

We recently conducted an intriguing webinar exploring the data mesh concept, and how it’s transforming...

August 29, 2023
3 Key Components to Mastering Federated Data Mesh Governance

Like other modern advancements in data use, the data mesh concept is rooted in a...

April 5, 2023
Moving from Legacy BI Extracts to Modern Data Security & Engineering

Before we can talk about modernizing from a legacy Business Intelligence (BI) extract, we need...

August 30, 2022
How to Harness the Power of The Modern Data Stack

For Dave DeWalt, Founder and Managing Director of advisory firm (and Immuta investor) NightDragon, the...

August 10, 2022
Enabling Tableau Row-Level Security with Snowflake & Immuta

The ability to efficiently discover data and visualize it in meaningful ways has never been...

June 14, 2022
How Immuta Simplifies Sensitive Data Tagging for Snowflake Data Lineage

Data is essential to modern business, thanks to its ability to improve insights and drive...

June 13, 2022
Resilient, Agile, and Future-Ready: A Roundtable on the Modern Data Stack

The modern data stack bears the immense responsibility of storing, protecting, analyzing, and operationalizing a...

June 8, 2022
How to Mask Sensitive Financial Data with Databricks and Immuta

As data moves among the storage, compute, and analysis layers of a data stack, there...

June 1, 2022
How to Enable SaaS Data Governance on Snowflake Partner Connect

Have you wondered how to protect your Snowflake data warehouse with column-, row-, and cell-level...

May 13, 2022
How to Define a Data Masking Standard for Compliant Analytics

What Are Common Data Masking Techniques? How Should I Define a Data Masking Standard for...

April 29, 2022
What is a Data Mesh Architecture and How Does it Work?

Governance and security are hot topics in data mesh, as evidenced by the recent webinar I co-presented...

April 27, 2022
Simplifying Snowflake Security with Alation & Immuta

This blog was co-authored with Deepak Nelli, Director of Sales Engineering at Alation. The modern...

April 24, 2022
Protect Sensitive Data with Key Privacy Enhancing Techniques

According to the Identity Theft Resource Center, there were 1,862 data breaches in 2021, exceeding the...

April 21, 2022
5 Steps to Make Data a Strategic Asset for Geospatial Intelligence

In 2021, the National Geospatial-Intelligence Agency (NGA) published its new data strategy, which seeks to...

Data Access Management
April 4, 2022
How To Easily Adapt Data Access Management for Table Grants

Attribute-based access control (ABAC) grants or restricts access to data using context-based decisions based on...

March 4, 2022
SaaS Data Security: Faster, More Flexible Data Access Control

As cloud adoption accelerates, SaaS-based products have also exploded to fill the agility, scalability, and...

February 22, 2022
What is ABAC? Attribute-Based Access Control 101

There’s a lot of confusion in the market about attribute-based access control (ABAC) and what it actually...

3 Best Practices for Maximizing Data Management Efficiency
January 20, 2022
3 Best Practices for Maximizing Data Management Efficiency

In 2020, global spending on cloud data services reached $312 billion. In 2022, Gartner estimates...

January 7, 2022
How to Integrate Identity and Access Management Across Cloud Platforms

Identity and access management (IAM) systems have become essential components of organizational workflows, allowing users...

December 10, 2021
How to Implement Immuta with Collibra

Immuta is the universal cloud data access control platform that gives data engineering and operations...

November 16, 2021
Snowflake and Immuta Pair Up to Provide an Industry-Leading Data Governance Solution

For Data Engineers responsible for delivering data to consumers, the effort needed to wrangle policies...

October 28, 2021
What is CMMC? Cybersecurity Maturity Model Certification Overview

If you’ve heard the term CMMC being used more frequently, you’re not alone. This upcoming...

Understanding Differential Data Privacy
October 18, 2021
Understanding Differential Data Privacy

In today’s day and age, we’re accustomed to technological advances and capabilities being uncovered all...

September 20, 2021
Modernizing From an RBAC to ABAC Model: Is It Hard?

The good news is no. The better news is you are already 90% of the...

June 29, 2021
The Complete Guide to Data Security Compliance Laws and Regulations

Compliance regulations in the data security space are constantly changing and evolving, with more new...

June 28, 2021
What Is Data Redaction?

There’s an old adage that all press is good press, but one kind of attention...

June 9, 2021
SQL Is Your Data Mesh API

What Is a Data Mesh? As Zhamak Dehghani describes in her original article, “How to...

May 25, 2021
How Immuta Addresses the Department of Defense Data Strategy Goals

Immuta was born out of the Intelligence Community in 2015 to help organizations solve the...

May 5, 2021
How AstrumU Maximizes Data Privacy & Utility with Immuta & Databricks

Kaj Pedersen, Chief Technical Officer at AstrumU, joined Immuta and Databricks at a recent Amazon...

April 9, 2021
Taking Policies the Last Mile with Looker & Immuta

“Don’t Repeat Yourself” is a powerful principle for software engineers and data professionals. But staying...

March 10, 2021
Dogfooding Data Access Control

Data access control: quixotic enterprise initiative, or the top priority of a startup’s first data...

January 20, 2021
How To: Access Controls in Databricks Using Immuta

The pros and cons of role-based access control (RBAC) and attribute-based access control (ABAC) have...

November 30, 2020
How to Implement Databricks Access Control with R and Scala

Databricks table ACLs let data engineers programmatically grant and revoke access to tables. With table...

October 16, 2020
Role-Based Access Control vs. Attribute-Based Access Control

The terms role-based access control and attribute-based access control are well known, but not necessarily well understood — or...

October 2, 2020
How to Avoid the Most Common Cloud Migration Challenges

Cloud provider capabilities are evolving faster than ever, and enterprises are taking notice. With all...

September 18, 2020
A Low-Risk, Low-Cost Cloud Migration Roadmap

Lifting and shifting data science operations to the cloud can be expensive and risky. From...

June 24, 2020
Data-as-a-Service with Databricks Enterprise Cloud Service

The new Databricks Enterprise Cloud Service architecture provides powerful network security capabilities, however, a lesser...

June 2, 2020
Using Adaptive Data Governance to Succeed in Digital Business

Data and analytics leaders’ endeavors often do not pass through a centralized organization or figure....

April 9, 2019
How Policy Leaders Can Democratize Data Ethics

Now, even Facebook’s Mark Zuckerberg is calling for GDPR-like national data regulations. His goals are laudable. He...

March 5, 2019
7 Legal Principles to Stay Ahead of the Regulatory Curve

Just this year, countries that constitute 50% of the world’s GDP are considering or enforcing...

January 15, 2019
Create Instant, Customizable Reports on Data Activities with Immuta

Reports on data processing activities are crucial for compliance. Describing processing activities – like what...

January 22, 2018
What’s A Legal Engineer?

Just over a year ago, I wrote a blogpost titled “A Lawyer and A Data...