
The Next Generation of CCPA Compliance Requirements
The 2020 elections not only saw record turnout, but also ushered in a suite of...

What Are the Most Common Types of Data Masking?
What Are the Most Common Types of Data Masking? Data masking is a type of...

What Is Policy-Based Access Control?
In daily conversation, we often use umbrella terms to group things together. If someone tells...

The Myth of Vendor Lock-In: Building vs. Buying in the Federal Market
Recently, across the social media spectrum there has been an uptick in government program leaders,...

What is a Data Supply Chain?
We’re all familiar with supply chains in the realm of manufacturing. Well, the same concept...

Immuta vs. Ranger: Research Comparison Finds Immuta’s ABAC Reduces Policy Burden by 75x
The role-based access control versus attribute-based access control debate has been going on for decades....

The Top 5 Barriers to Data Sharing and How to Overcome Them
Technology has made our world increasingly interconnected and interdependent, and as a result, the need...

Data Masking Tools and Solutions
Data masking is one of the most important tasks in data governance. It may seem...

Data Engineering is Critical to Driving Data and Analytics Success
Organizations are increasingly relying on data analytics to mine insights that drive business results. Data-driven...

What is a Data Catalog? 5 Features of a Modern Data Catalog
Imagine going to a library in search of a specific book with a piece of...

How k-Anonymization is Making Health Data More Secure
Reflecting on the impact that the COVID-19 pandemic has had on daily life, the importance...

4 Ways a Data Science Company Enables Research at Scale
Scalability is critical to driving accurate, applicable researched-based predictions and insights. But without the proper...