
3 Key Components to Mastering Federated Data Mesh Governance
Like other modern advancements in data use, the data mesh concept is rooted in a...

Moving from Legacy BI Extracts to Modern Data Security & Engineering
Before we can talk about modernizing from a legacy Business Intelligence (BI) extract, we need...

How to Harness the Power of The Modern Data Stack
For Dave DeWalt, Founder and Managing Director of advisory firm (and Immuta investor) NightDragon, the...

Enabling Tableau Row-Level Security with Snowflake & Immuta
The ability to efficiently discover data and visualize it in meaningful ways has never been...

How Immuta Simplifies Sensitive Data Tagging for Snowflake Data Lineage
Data is essential to modern business, thanks to its ability to improve insights and drive...

Resilient, Agile, and Future-Ready: A Roundtable on the Modern Data Stack
The modern data stack bears the immense responsibility of storing, protecting, analyzing, and operationalizing a...

How to Mask Sensitive Financial Data with Databricks and Immuta
As data moves among the storage, compute, and analysis layers of a data stack, there...

How to Enable SaaS Data Governance on Snowflake Partner Connect
Have you wondered how to protect your Snowflake data warehouse with column-, row-, and cell-level...

How to Define a Data Masking Standard for Compliant Analytics
What Are Common Data Masking Techniques? How Should I Define a Data Masking Standard for...

What is a Data Mesh Architecture and How Does it Work?
Governance and security are hot topics in data mesh, as evidenced by the recent webinar I co-presented...

Simplifying Snowflake Security with Alation & Immuta
This blog was co-authored with Deepak Nelli, Director of Sales Engineering at Alation. The modern...

Protect Sensitive Data with Key Privacy Enhancing Techniques
According to the Identity Theft Resource Center, there were 1,862 data breaches in 2021, exceeding the...

5 Steps to Make Data a Strategic Asset for Geospatial Intelligence
In 2021, the National Geospatial-Intelligence Agency (NGA) published its new data strategy, which seeks to...

How To Easily Adapt Data Access Management for Table Grants
Attribute-based access control (ABAC) grants or restricts access to data using context-based decisions based on...

SaaS Data Security: Faster, More Flexible Data Access Control
As cloud adoption accelerates, SaaS-based products have also exploded to fill the agility, scalability, and...

What is ABAC? Attribute-Based Access Control 101
There’s a lot of confusion in the market about attribute-based access control (ABAC) and what it actually...

3 Best Practices for Maximizing Data Management Efficiency
In 2020, global spending on cloud data services reached $312 billion. In 2022, Gartner estimates...

How to Integrate Identity and Access Management Across Cloud Platforms
Identity and access management (IAM) systems have become essential components of organizational workflows, allowing users...

How to Implement Immuta with Collibra
Immuta is the universal cloud data access control platform that gives data engineering and operations...
Snowflake and Immuta Pair Up to Provide an Industry-Leading Data Governance Solution
For Data Engineers responsible for delivering data to consumers, the effort needed to wrangle policies...

What is CMMC? Cybersecurity Maturity Model Certification Overview
If you’ve heard the term CMMC being used more frequently, you’re not alone. This upcoming...

Understanding Differential Data Privacy
In today’s day and age, we’re accustomed to technological advances and capabilities being uncovered all...

Modernizing From an RBAC to ABAC Model: Is It Hard?
The good news is no. The better news is you are already 90% of the...

The Top 5 Barriers to Data Sharing and How to Overcome Them
Technology has made our world increasingly interconnected and interdependent, and as a result, the need...

The Complete Guide to Data Security Compliance Laws and Regulations
Compliance regulations in the data security space are constantly changing and evolving, with more new...

What Is Data Redaction?
There’s an old adage that all press is good press, but one kind of attention...

How Policy as Code Automates Fine-Grained Access Controls
Writing or modifying scripts, managing templates, or creating policy for cloud data access control platforms...

SQL Is Your Data Mesh API
What Is a Data Mesh? As Zhamak Dehghani describes in her original article, “How to...

How Immuta Addresses the Department of Defense Data Strategy Goals
Immuta was born out of the Intelligence Community in 2015 to help organizations solve the...

How AstrumU Maximizes Data Privacy & Utility with Immuta & Databricks
Kaj Pedersen, Chief Technical Officer at AstrumU, joined Immuta and Databricks at a recent Amazon...

Taking Policies the Last Mile with Looker & Immuta
“Don’t Repeat Yourself” is a powerful principle for software engineers and data professionals. But staying...

Dogfooding Data Access Control
Data access control: quixotic enterprise initiative, or the top priority of a startup’s first data...

How To: Access Controls in Databricks Using Immuta
The pros and cons of role-based access control (RBAC) and attribute-based access control (ABAC) have...

How to Implement Databricks Access Control with R and Scala
Databricks table ACLs let data engineers programmatically grant and revoke access to tables. With table...

Role-Based Access Control vs. Attribute-Based Access Control
The terms role-based access control and attribute-based access control are well known, but not necessarily well understood — or...

How to Avoid the Most Common Cloud Migration Challenges
Cloud provider capabilities are evolving faster than ever, and enterprises are taking notice. With all...

A Low-Risk, Low-Cost Cloud Migration Roadmap
Lifting and shifting data science operations to the cloud can be expensive and risky. From...

Data-as-a-Service with Databricks Enterprise Cloud Service
The new Databricks Enterprise Cloud Service architecture provides powerful network security capabilities, however, a lesser...

Using Adaptive Data Governance to Succeed in Digital Business
Data and analytics leaders’ endeavors often do not pass through a centralized organization or figure....

How Policy Leaders Can Democratize Data Ethics
Now, even Facebook’s Mark Zuckerberg is calling for GDPR-like national data regulations. His goals are laudable. He...

7 Legal Principles to Stay Ahead of the Regulatory Curve
Just this year, countries that constitute 50% of the world’s GDP are considering or enforcing...

Create Instant, Customizable Reports on Data Activities with Immuta
Reports on data processing activities are crucial for compliance. Describing processing activities – like what...

What’s A Legal Engineer?
Just over a year ago, I wrote a blogpost titled “A Lawyer and A Data...