
Social vs. Technical: Leaders Weigh in on Data Mesh Challenges
Immuta CTO and Co-Founder Steve Touw sat down with Paul Rankin, Head of Data Management...

Moving from Legacy BI Extracts to Modern Data Security & Engineering
Before we can talk about modernizing from a legacy Business Intelligence (BI) extract, we need...

Why Data Monitoring is Key to Sensitive Data Protection
According to one 2022 report, 89% of companies claim that their organization is taking a...

Scaling Secure Data Access with Immuta & Databricks Unity Catalog
For data engineers, the effort required to wrangle access policies grows exponentially as the complexity...

What is ABAC? Attribute-Based Access Control 101
There’s a lot of confusion in the market about attribute-based access control (ABAC) and what it actually...

GigaOm Report Positions Immuta as the Leader in Data Access Control
Data access control and governance are central tenets of a strong cloud data strategy. As...

Modernizing From an RBAC to ABAC Model: Is It Hard?
The good news is no. The better news is you are already 90% of the...

Secure Access to Databricks Without Compromising Performance & Scalability
You need scalability and performance Scalability and performance go hand-in-hand. If you have great performance,...

Immuta vs. Ranger: Research Comparison Finds Immuta’s ABAC Reduces Policy Burden by 75x
The role-based access control versus attribute-based access control debate has been going on for decades....

SQL Is Your Data Mesh API
What Is a Data Mesh? As Zhamak Dehghani describes in her original article, “How to...

Enabling Third Party Sharing with Databricks Data Sharing
Would you like to monetize your internal data by sharing it externally with third parties?...

Role-Based Access Control vs. Attribute-Based Access Control
The terms role-based access control and attribute-based access control are well known, but not necessarily well understood — or...

A Low-Risk, Low-Cost Cloud Migration Roadmap
Lifting and shifting data science operations to the cloud can be expensive and risky. From...

Data-as-a-Service with Databricks Enterprise Cloud Service
The new Databricks Enterprise Cloud Service architecture provides powerful network security capabilities, however, a lesser...

Databricks and Immuta: Data Analytics with Automated Governance
Immuta and Databricks have formed a deep business partnership and integrated their market-leading analytics and...

Security Meets Privacy… in Databricks
Security is always a driving force, particularly for organizations making the move from on-premises Hadoop...

Security and Privacy Layers in Snowflake for Highly Sensitive Data
“Over the past few years, data privacy has evolved from ‘nice to have’ to a...

New Release: Native Snowflake Policy Enforcement, Dynamic k-anonymization, External Masking
As I prepared to write this blog about the value provided by our latest Immuta...

Data Governance Anti-Patterns: Stop Conflating Who, Why, and What
(This Is Part II of Our “Data Governance Anti-Patterns Series”, Part I Can Be Found Here)....

Data Governance Anti-Patterns: The Copy & Paste Data Sharing Method
(This Is Part III of Our “Data Governance Anti-Patterns Series,” Part II Can Be Found...

Differentiating Data Security in the GDPR from Privacy
The European Union’s General Data Protection Regulation — one of the most forward-leaning privacy regulations...

Homomorphic Encryption Alone Is Security, Not Privacy
I’ve seen written many times that “Privacy can be improved with techniques like differential privacy...

Stop Reinventing the Wheel: The Case for Unified Data Policies
(This Is Part I of Our “Data Governance Anti-Patterns Series”, Part II Can Be Found Here). Anti-patterns...