October 31, 2023
Social vs. Technical: Leaders Weigh in on Data Mesh Challenges

Immuta CTO and Co-Founder Steve Touw sat down with Paul Rankin, Head of Data Management...

April 5, 2023
Moving from Legacy BI Extracts to Modern Data Security & Engineering

Before we can talk about modernizing from a legacy Business Intelligence (BI) extract, we need...

October 28, 2022
Why Data Monitoring is Key to Sensitive Data Protection

According to one 2022 report, 89% of companies claim that their organization is taking a...

August 11, 2022
Scaling Secure Data Access with Immuta & Databricks Unity Catalog

For data engineers, the effort required to wrangle access policies grows exponentially as the complexity...

February 22, 2022
What is ABAC? Attribute-Based Access Control 101

There’s a lot of confusion in the market about attribute-based access control (ABAC) and what it actually...

October 13, 2021
GigaOm Report Positions Immuta as the Leader in Data Access Control

Data access control and governance are central tenets of a strong cloud data strategy. As...

September 20, 2021
Modernizing From an RBAC to ABAC Model: Is It Hard?

The good news is no. The better news is you are already 90% of the...

July 26, 2021
Secure Access to Databricks Without Compromising Performance & Scalability

You need scalability and performance Scalability and performance go hand-in-hand. If you have great performance,...

July 20, 2021
Immuta vs. Ranger: Research Comparison Finds Immuta’s ABAC Reduces Policy Burden by 75x

The role-based access control versus attribute-based access control debate has been going on for decades....

June 9, 2021
SQL Is Your Data Mesh API

What Is a Data Mesh? As Zhamak Dehghani describes in her original article, “How to...

May 26, 2021
Enabling Third Party Sharing with Databricks Data Sharing

Would you like to monetize your internal data by sharing it externally with third parties?...

October 16, 2020
Role-Based Access Control vs. Attribute-Based Access Control

The terms role-based access control and attribute-based access control are well known, but not necessarily well understood — or...

September 18, 2020
A Low-Risk, Low-Cost Cloud Migration Roadmap

Lifting and shifting data science operations to the cloud can be expensive and risky. From...

June 24, 2020
Data-as-a-Service with Databricks Enterprise Cloud Service

The new Databricks Enterprise Cloud Service architecture provides powerful network security capabilities, however, a lesser...

Databricks and Immuta
June 6, 2020
Databricks and Immuta: Data Analytics with Automated Governance

Immuta and Databricks have formed a deep business partnership and integrated their market-leading analytics and...

May 14, 2020
Security Meets Privacy… in Databricks

Security is always a driving force, particularly for organizations making the move from on-premises Hadoop...

May 6, 2020
Security and Privacy Layers in Snowflake for Highly Sensitive Data

“Over the past few years, data privacy has evolved from ‘nice to have’ to a...

May 3, 2020
New Release: Native Snowflake Policy Enforcement, Dynamic k-anonymization, External Masking

As I prepared to write this blog about the value provided by our latest Immuta...

January 28, 2019
Data Governance Anti-Patterns: Stop Conflating Who, Why, and What

(This Is Part II of Our “Data Governance Anti-Patterns Series”, Part I Can Be Found Here)....

Data Governance Anti-Patterns
January 8, 2019
Data Governance Anti-Patterns: The Copy & Paste Data Sharing Method

(This Is Part III of Our “Data Governance Anti-Patterns Series,” Part II Can Be Found...

December 19, 2018
Differentiating Data Security in the GDPR from Privacy

The European Union’s General Data Protection Regulation — one of the most forward-leaning privacy regulations...

Homomorphic Encryption
September 14, 2018
Homomorphic Encryption Alone Is Security, Not Privacy

I’ve seen written many times that “Privacy can be improved with techniques like differential privacy...

December 12, 2017
Stop Reinventing the Wheel: The Case for Unified Data Policies

(This Is Part I of Our “Data Governance Anti-Patterns Series”, Part II Can Be Found Here). Anti-patterns...