![](https://www.immuta.com/wp-content/uploads/2022/04/Cover-Image-Lock.jpg)
Immuta Introduces Multi-Layered Security for RAG-Based GenAI
![](https://www.immuta.com/wp-content/uploads/2023/09/Cover-Image-Data-Mesh-Webinar-w_-Roche-and-SanjMo@2x.jpg)
Social vs. Technical: Leaders Weigh in on Data Mesh Challenges
Immuta CTO and Co-Founder Steve Touw sat down with Paul Rankin, Head of Data Management...
![](https://www.immuta.com/wp-content/uploads/2021/02/Cover-Image-Water.jpg)
Moving from Legacy BI Extracts to Modern Data Security & Engineering
Before we can talk about modernizing from a legacy Business Intelligence (BI) extract, we need...
![](https://www.immuta.com/wp-content/uploads/2022/10/stephane-mingot-tnf2pSAd3Yc-unsplash-scaled.jpg)
Why Data Monitoring is Key to Sensitive Data Protection
According to one 2022 report, 89% of companies claim that their organization is taking a...
![](https://www.immuta.com/wp-content/uploads/2022/06/cover-image-blog-29-release-immuta-and-databricks@2x-2200x800-1.png)
Scaling Secure Data Access with Immuta & Databricks Unity Catalog
For data engineers, the effort required to wrangle access policies grows exponentially as the complexity...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_129@2x-1.png)
What is ABAC? Attribute-Based Access Control 101
There’s a lot of confusion in the market about attribute-based access control (ABAC) and what it actually...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_163@2x.png)
GigaOm Report Positions Immuta as the Leader in Data Access Control
Data access control and governance are central tenets of a strong cloud data strategy. As...
![](https://www.immuta.com/wp-content/uploads/2021/02/Cover-Image-Tennis.jpg)
Modernizing From an RBAC to ABAC Model: Is It Hard?
The good news is no. The better news is you are already 90% of the...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_117@2x.png)
Secure Access to Databricks Without Compromising Performance & Scalability
You need scalability and performance Scalability and performance go hand-in-hand. If you have great performance,...
![](https://www.immuta.com/wp-content/uploads/2021/02/Cover-Image-Water.jpg)
Immuta vs. Ranger: Research Comparison Finds Immuta’s ABAC Reduces Policy Burden by 75x
The role-based access control versus attribute-based access control debate has been going on for decades....
![](https://www.immuta.com/wp-content/uploads/2022/06/cover-image-immuta-and-starburst.png)
SQL Is Your Data Mesh API
What Is a Data Mesh? As Zhamak Dehghani describes in her original article, “How to...
![](https://www.immuta.com/wp-content/uploads/2022/06/blog_hero_immuta_and_databricks_partnership@2x-2200x800-1.png)
Enabling Third Party Sharing with Databricks Data Sharing
Would you like to monetize your internal data by sharing it externally with third parties?...
![](https://www.immuta.com/wp-content/uploads/2021/02/Cover-Image-Chairs.jpg)
Role-Based Access Control vs. Attribute-Based Access Control
The terms role-based access control and attribute-based access control are well known, but not necessarily well understood — or...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_71@2x.png)
A Low-Risk, Low-Cost Cloud Migration Roadmap
Lifting and shifting data science operations to the cloud can be expensive and risky. From...
![](https://www.immuta.com/wp-content/uploads/2022/06/cover-image-blog-29-release-immuta-and-databricks@2x-2200x800-1.png)
Data-as-a-Service with Databricks Enterprise Cloud Service
The new Databricks Enterprise Cloud Service architecture provides powerful network security capabilities, however, a lesser...
![Databricks and Immuta](https://www.immuta.com/wp-content/uploads/2022/06/blog_hero_immuta_and_databricks_partnership@2x.png)
Databricks and Immuta: Data Analytics with Automated Governance
Immuta and Databricks have formed a deep business partnership and integrated their market-leading analytics and...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_189@2x-2.png)
Security Meets Privacy… in Databricks
Security is always a driving force, particularly for organizations making the move from on-premises Hadoop...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_124@2x.png)
Security and Privacy Layers in Snowflake for Highly Sensitive Data
“Over the past few years, data privacy has evolved from ‘nice to have’ to a...
![](https://www.immuta.com/wp-content/uploads/2022/06/immuta-release-features@2x-2200x800-1.png)
New Release: Native Snowflake Policy Enforcement, Dynamic k-anonymization, External Masking
As I prepared to write this blog about the value provided by our latest Immuta...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_57@2x.png)
Data Governance Anti-Patterns: Stop Conflating Who, Why, and What
(This Is Part II of Our “Data Governance Anti-Patterns Series”, Part I Can Be Found Here)....
![Data Governance Anti-Patterns](https://www.immuta.com/wp-content/uploads/2022/06/art_58@2x-1.png)
Data Governance Anti-Patterns: The Copy & Paste Data Sharing Method
(This Is Part III of Our “Data Governance Anti-Patterns Series,” Part II Can Be Found...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_47@2x.png)
Differentiating Data Security in the GDPR from Privacy
The European Union’s General Data Protection Regulation — one of the most forward-leaning privacy regulations...
![Homomorphic Encryption](https://www.immuta.com/wp-content/uploads/2022/06/art_132@2x.png)
Homomorphic Encryption Alone Is Security, Not Privacy
I’ve seen written many times that “Privacy can be improved with techniques like differential privacy...
![](https://www.immuta.com/wp-content/uploads/2022/06/art_55@2x.png)
Stop Reinventing the Wheel: The Case for Unified Data Policies
(This Is Part I of Our “Data Governance Anti-Patterns Series”, Part II Can Be Found Here). Anti-patterns...