Webinar: Join Immuta, HP, & NightDragon to learn why managing access is critical for the future of data use.

Sign Up
August 10, 2022
How to Enable Tableau Row-Level Security with Snowflake & Immuta

The ability to efficiently discover data and visualize it in meaningful ways has never been...

June 14, 2022
How Immuta Simplifies Sensitive Data Tagging for Snowflake Data Lineage

Data is essential to modern business, thanks to its ability to improve insights and drive...

June 13, 2022
Resilient, Agile, and Future-Ready: A Roundtable on the Modern Data Stack

The modern data stack bears the immense responsibility of storing, protecting, analyzing, and operationalizing a...

June 8, 2022
How to Mask Sensitive Financial Data with Databricks and Immuta

As data moves among the storage, compute, and analysis layers of a data stack, there...

June 1, 2022
How to Deploy Immuta SaaS on Snowflake Partner Connect

Have you wondered how to protect your Snowflake data warehouse with column-, row-, and cell-level...

May 13, 2022
How to Define a Data Masking Standard for Compliant Analytics

What Are Common Data Masking Techniques? How Should I Define a Data Masking Standard for...

April 29, 2022
How to Decentralize Data Access Policies in the Data Mesh Architecture

Governance and security are hot topics in data mesh, as evidenced by the recent webinar I co-presented...

April 27, 2022
How to Simplify Snowflake Security with Alation and Immuta

This blog was co-authored with Deepak Nelli, Director of Sales Engineering at Alation. The modern...

April 24, 2022
How to Mask PII Data: A Guide to Data Masking Techniques

According to the Identity Theft Resource Center, there were 1,862 data breaches in 2021, exceeding the...

April 21, 2022
5 Steps to Make Data a Strategic Asset for Geospatial Intelligence

In 2021, the National Geospatial-Intelligence Agency (NGA) published its new data strategy, which seeks to...

Data Access Management
April 4, 2022
How To Easily Adapt Data Access Management for Table Grants

Attribute-based access control (ABAC) grants or restricts access to data using context-based decisions based on...

March 4, 2022
SaaS-Based Data Access Control Will Revolutionize Data Use at Scale

As cloud adoption accelerates, SaaS-based products have also exploded to fill the agility, scalability, and...

February 22, 2022
What is ABAC? Attribute-Based Access Control 101

There’s a lot of confusion in the market about attribute-based access control (ABAC) and what it actually...

3 Best Practices for Maximizing Data Management Efficiency
January 20, 2022
3 Best Practices for Maximizing Data Management Efficiency

In 2020, global spending on cloud data services reached $312 billion. In 2022, Gartner estimates...

January 7, 2022
How to Integrate Identity and Access Management Across Cloud Platforms

Identity and access management (IAM) systems have become essential components of organizational workflows, allowing users...

December 10, 2021
How to Implement Immuta with Collibra

Immuta is the universal cloud data access control platform that gives data engineering and operations...

Immuta and Snowflake
November 16, 2021
Snowflake and Immuta Pair Up to Provide an Industry-Leading Data Governance Solution

For Data Engineers responsible for delivering data to consumers, the effort needed to wrangle policies...

October 28, 2021
What is CMMC? Cybersecurity Maturity Model Certification Overview

If you’ve heard the term CMMC being used more frequently, you’re not alone. This upcoming...

Understanding Differential Data Privacy
October 18, 2021
Understanding Differential Data Privacy

In today’s day and age, we’re accustomed to technological advances and capabilities being uncovered all...

September 20, 2021
Modernizing From an RBAC to ABAC Model: Is It Hard?

The good news is no. The better news is you are already 90% of the...

July 6, 2021
The Top 5 Barriers to Data Sharing and How to Overcome Them

Technology has made our world increasingly interconnected and interdependent, and as a result, the need...

June 29, 2021
The Complete Guide to Data Security Compliance Laws and Regulations

Compliance regulations in the data security space are constantly changing and evolving, with more new...

June 28, 2021
What Is Data Redaction?

There’s an old adage that all press is good press, but one kind of attention...

June 14, 2021
Automate Fine-Grained Access Controls with Policy-as-Code

Writing or modifying scripts, managing templates, or creating policy for cloud data access control platforms...

June 9, 2021
SQL Is Your Data Mesh API

What Is a Data Mesh? As Zhamak Dehghani describes in her original article, “How to...

May 25, 2021
How Immuta Addresses the Department of Defense Data Strategy Goals

Immuta was born out of the Intelligence Community in 2015 to help organizations solve the...

May 7, 2021
What is Data De-identification and Why is It Important?

Data de-identification is a form of dynamic data masking that refers to breaking the link between data...

May 5, 2021
How AstrumU Maximizes Data Privacy & Utility with Immuta & Databricks

Kaj Pedersen, Chief Technical Officer at AstrumU, joined Immuta and Databricks at a recent Amazon...

April 9, 2021
Taking Policies the Last Mile with Looker & Immuta

“Don’t Repeat Yourself” is a powerful principle for software engineers and data professionals. But staying...

March 10, 2021
Dogfooding Data Access Control

Data access control: quixotic enterprise initiative, or the top priority of a startup’s first data...

January 20, 2021
How to Unlock Successful, Scalable GDPR Compliance

The General Data Protection Regulation (GDPR) is omnipresent: It applies to every person or entity...

January 20, 2021
How To: Access Controls in Databricks Using Immuta

The pros and cons of role-based access control (RBAC) and attribute-based access control (ABAC) have...

November 30, 2020
How to Implement Databricks Access Control with R and Scala

Databricks table ACLs let data engineers programmatically grant and revoke access to tables. With table...

October 16, 2020
Role-Based Access Control (RBAC) vs. Attribute-Based Access Control (ABAC) Explained

The terms role-based access control and attribute-based access control are well known, but not necessarily well understood — or...

October 2, 2020
How to Avoid the Most Common Cloud Migration Challenges

Cloud provider capabilities are evolving faster than ever, and enterprises are taking notice. With all...

September 18, 2020
A Low-Risk, Low-Cost Cloud Migration Roadmap

Lifting and shifting data science operations to the cloud can be expensive and risky. From...

June 2, 2020
Data and Analytics Leaders Must Use Adaptive Governance to Succeed in Digital Business

Data and analytics leaders’ endeavors often do not pass through a centralized organization or figure....

April 9, 2019
How Policy Leaders Can Democratize Data Ethics

Now, even Facebook’s Mark Zuckerberg is calling for GDPR-like national data regulations. His goals are laudable. He...

March 5, 2019
7 Legal Principles to Stay Ahead of the Regulatory Curve

Just this year, countries that constitute 50% of the world’s GDP are considering or enforcing...

January 15, 2019
Create Instant, Customizable Reports on Data Activities with Immuta

Reports on data processing activities are crucial for compliance. Describing processing activities – like what...

January 22, 2018
What’s A Legal Engineer?

Just over a year ago, I wrote a blogpost titled “A Lawyer and A Data...