![](https://www.immuta.com/wp-content/uploads/2021/03/Security-Gates.jpg)
How to Define Data Domains for Distributed Ownership
How much time have you spent sifting through organization-level data trying to find the right...
![](https://www.immuta.com/wp-content/uploads/2024/04/Case-Study-Cover-Image-Roche-1-scaled.jpg)
Implementing Privacy Controls for Genomics
Genomic data holds significant promise in advancing personalized medicine, streamlining disease treatments, and improving health...
![](https://www.immuta.com/wp-content/uploads/2021/02/Cover-Image-Track.jpg)
Why Data Security is the Missing Link to Business Value
The number one performance indicator for most businesses is value. How much value will this...
![](https://www.immuta.com/wp-content/uploads/2023/10/Cover-Image-Immuta-and-Databricks@2x.jpg)
Enhancing Databricks Unity Catalog for Evolving Data & AI Governance
In the 2024 State of Data Security Report, a vast majority (88%) of data professionals...
![](https://www.immuta.com/wp-content/uploads/2021/02/Cover-Image-Chairs.jpg)
How to Make Data Mesh a Reality: An Implementation Roadmap
We recently conducted an intriguing webinar exploring the data mesh concept, and how it’s transforming...
![](https://www.immuta.com/wp-content/uploads/2021/02/Cover-Image-Grate.jpg)
3 Key Components to Mastering Federated Data Mesh Governance
Like other modern advancements in data use, the data mesh concept is rooted in a...
![](https://www.immuta.com/wp-content/uploads/2021/02/Cover-Image-Water.jpg)
Moving from Legacy BI Extracts to Modern Data Security & Engineering
Before we can talk about modernizing from a legacy Business Intelligence (BI) extract, we need...
![](https://www.immuta.com/wp-content/uploads/2022/08/Cover-Image-Immuta-NightDragon-HP-Aug-2022@2x.png)
How to Harness the Power of The Modern Data Stack
For Dave DeWalt, Founder and Managing Director of advisory firm (and Immuta investor) NightDragon, the...
![](https://www.immuta.com/wp-content/uploads/2021/02/Cover-Image-Binoculars.jpg)
Enabling Tableau Row-Level Security with Snowflake & Immuta
The ability to efficiently discover data and visualize it in meaningful ways has never been...
![](https://www.immuta.com/wp-content/uploads/2022/06/cover-image-sml-immuta-and-snowflake-press-release-2.png)
How Immuta Simplifies Sensitive Data Tagging for Snowflake Data Lineage
Data is essential to modern business, thanks to its ability to improve insights and drive...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_197@2x.png)
Resilient, Agile, and Future-Ready: A Roundtable on the Modern Data Stack
The modern data stack bears the immense responsibility of storing, protecting, analyzing, and operationalizing a...
![](https://www.immuta.com/wp-content/uploads/2022/06/cover-image-blog-29-release-immuta-and-databricks@2x-2200x800-1.png)
How to Mask Sensitive Financial Data with Databricks and Immuta
As data moves among the storage, compute, and analysis layers of a data stack, there...
![](https://www.immuta.com/wp-content/uploads/2022/06/cover-image-sml-immuta-and-snowflake-press-release-2.png)
How to Enable SaaS Data Governance on Snowflake Partner Connect
Have you wondered how to protect your Snowflake data warehouse with column-, row-, and cell-level...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_136@2x.png)
How to Define a Data Masking Standard for Compliant Analytics
What Are Common Data Masking Techniques? How Should I Define a Data Masking Standard for...
![](https://www.immuta.com/wp-content/uploads/2022/06/cover-image-immuta-and-starburst-1.png)
What is a Data Mesh Architecture and How Does it Work?
Governance and security are hot topics in data mesh, as evidenced by the recent webinar I co-presented...
![](https://www.immuta.com/wp-content/uploads/2022/04/Cover-Image-Lock.jpg)
Simplifying Snowflake Security with Alation & Immuta
This blog was co-authored with Deepak Nelli, Director of Sales Engineering at Alation. The modern...
![](https://www.immuta.com/wp-content/uploads/2022/06/mask.png)
Protect Sensitive Data with Key Privacy Enhancing Techniques
According to the Identity Theft Resource Center, there were 1,862 data breaches in 2021, exceeding the...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_173@2x.png)
5 Steps to Make Data a Strategic Asset for Geospatial Intelligence
In 2021, the National Geospatial-Intelligence Agency (NGA) published its new data strategy, which seeks to...
![Data Access Management](https://www.immuta.com/wp-content/uploads/2022/06/art_12@2x-1.png)
How To Easily Adapt Data Access Management for Table Grants
Attribute-based access control (ABAC) grants or restricts access to data using context-based decisions based on...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_86@2x-1.png)
SaaS Data Security: Faster, More Flexible Data Access Control
As cloud adoption accelerates, SaaS-based products have also exploded to fill the agility, scalability, and...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_129@2x-1.png)
What is ABAC? Attribute-Based Access Control 101
There’s a lot of confusion in the market about attribute-based access control (ABAC) and what it actually...
![3 Best Practices for Maximizing Data Management Efficiency](https://www.immuta.com/wp-content/uploads/2022/06/art_130@2x.png)
3 Best Practices for Maximizing Data Management Efficiency
In 2020, global spending on cloud data services reached $312 billion. In 2022, Gartner estimates...
![](https://www.immuta.com/wp-content/uploads/2021/07/Cover-Image-Piano.jpg)
How to Integrate Identity and Access Management Across Cloud Platforms
Identity and access management (IAM) systems have become essential components of organizational workflows, allowing users...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_68@2x.png)
How to Implement Immuta with Collibra
Immuta is the universal cloud data access control platform that gives data engineering and operations...
Snowflake and Immuta Pair Up to Provide an Industry-Leading Data Governance Solution
For Data Engineers responsible for delivering data to consumers, the effort needed to wrangle policies...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_107@2x.png)
What is CMMC? Cybersecurity Maturity Model Certification Overview
If you’ve heard the term CMMC being used more frequently, you’re not alone. This upcoming...
![Understanding Differential Data Privacy](https://www.immuta.com/wp-content/uploads/2021/02/Cover-Image-Parking-Lot.jpg)
Understanding Differential Data Privacy
In today’s day and age, we’re accustomed to technological advances and capabilities being uncovered all...
![](https://www.immuta.com/wp-content/uploads/2021/02/Cover-Image-Tennis.jpg)
Modernizing From an RBAC to ABAC Model: Is It Hard?
The good news is no. The better news is you are already 90% of the...
![](https://www.immuta.com/wp-content/uploads/2021/09/Cover-Image-Window-Bars.jpg)
The Complete Guide to Data Security Compliance Laws and Regulations
Compliance regulations in the data security space are constantly changing and evolving, with more new...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_203@2x.png)
What Is Data Redaction?
There’s an old adage that all press is good press, but one kind of attention...
![](https://www.immuta.com/wp-content/uploads/2022/06/cover-image-immuta-and-starburst.png)
SQL Is Your Data Mesh API
What Is a Data Mesh? As Zhamak Dehghani describes in her original article, “How to...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_174@2x-825x300-1.png)
How Immuta Addresses the Department of Defense Data Strategy Goals
Immuta was born out of the Intelligence Community in 2015 to help organizations solve the...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_93@2x-825x300-1.png)
How AstrumU Maximizes Data Privacy & Utility with Immuta & Databricks
Kaj Pedersen, Chief Technical Officer at AstrumU, joined Immuta and Databricks at a recent Amazon...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_34@2x-2.png)
Taking Policies the Last Mile with Looker & Immuta
“Don’t Repeat Yourself” is a powerful principle for software engineers and data professionals. But staying...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_28@2x.png)
Dogfooding Data Access Control
Data access control: quixotic enterprise initiative, or the top priority of a startup’s first data...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_85@2x.png)
How To: Access Controls in Databricks Using Immuta
The pros and cons of role-based access control (RBAC) and attribute-based access control (ABAC) have...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_81@2x.png)
How to Implement Databricks Access Control with R and Scala
Databricks table ACLs let data engineers programmatically grant and revoke access to tables. With table...
![](https://www.immuta.com/wp-content/uploads/2021/02/Cover-Image-Chairs.jpg)
Role-Based Access Control vs. Attribute-Based Access Control
The terms role-based access control and attribute-based access control are well known, but not necessarily well understood — or...
![](https://www.immuta.com/wp-content/uploads/2022/06/how.png)
How to Avoid the Most Common Cloud Migration Challenges
Cloud provider capabilities are evolving faster than ever, and enterprises are taking notice. With all...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_71@2x.png)
A Low-Risk, Low-Cost Cloud Migration Roadmap
Lifting and shifting data science operations to the cloud can be expensive and risky. From...
![](https://www.immuta.com/wp-content/uploads/2022/06/cover-image-blog-29-release-immuta-and-databricks@2x-2200x800-1.png)
Data-as-a-Service with Databricks Enterprise Cloud Service
The new Databricks Enterprise Cloud Service architecture provides powerful network security capabilities, however, a lesser...
![](https://www.immuta.com/wp-content/uploads/2022/06/Cover-Image-E-Book-How-to-Design-and-Implement-a-Governance-Risk-and-Compliance-Framework-for-Enterprise-Data-Analytics_736x418@2x.webp)
Using Adaptive Data Governance to Succeed in Digital Business
Data and analytics leaders’ endeavors often do not pass through a centralized organization or figure....
![](https://www.immuta.com/wp-content/uploads/2022/06/art_33@2x-825x300-1.png)
How Policy Leaders Can Democratize Data Ethics
Now, even Facebook’s Mark Zuckerberg is calling for GDPR-like national data regulations. His goals are laudable. He...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_26@2x.png)
7 Legal Principles to Stay Ahead of the Regulatory Curve
Just this year, countries that constitute 50% of the world’s GDP are considering or enforcing...
![](https://www.immuta.com/wp-content/uploads/2021/02/Cover-Image-Bike.jpg)
Create Instant, Customizable Reports on Data Activities with Immuta
Reports on data processing activities are crucial for compliance. Describing processing activities – like what...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_21@2x.png)
What’s A Legal Engineer?
Just over a year ago, I wrote a blogpost titled “A Lawyer and A Data...