
What Should Teams Expect from the EU’s Open Finance Initiative?
At the core of the European Union’s data strategy lies a well-structured framework composed of...

Securing AI Systems: AI Threat Knowledge Bases
Artificial Intelligence (AI) systems have recently gained significantly greater visibility and use by the general...

3 Solution Patterns for Data Security Success
You’ve just adopted a data security solution – congratulations! Now what? As with any new...

What’s the Worst That Could Happen? A Guide to AI Risks
While generative artificial intelligence (AI), foundation models, and Large Language Models (LLMs) are often described...

Types of AI and Input Models Explained
ChatGPT is one of the fastest-growing artificial intelligence (AI)-powered apps of all time, but it...

How to Assess and Defend Against the Cyber Threat Landscape
According to the United States’ Cybersecurity & Infrastructure Security Agency (CISA), 47% of American adults...

Exploring Data Democratization: Pros, Cons, and Real-World Impact
As data is being analyzed in new ways to deliver better insights, organizations across industries...

What is Sensitive Data and How Should I Protect It?
If you’ve done any work with data, you’ve likely heard the term “sensitive data.” Data...

Democratizing AI & More: 3 Takeaways from Databricks’ Data + AI Summit
The Databricks Data + AI Summit converged on downtown San Francisco for its 10th year,...

How to Mitigate Risk by Mastering Cloud Storage Security
The volume of cloud data is increasing at an exponential rate. But with this growth...

Demystifying Data Security and Privacy in the Digital Age
As data evolves, so does the threat landscape. Facing the possibilities of targeted breaches from...

Data Mesh vs. Data Fabric: What’s the Difference?
When two different concepts sound or act alike, it can be easy to conflate them....

Bans, Breaches, and Budding Regulations: May 2023’s Key Stories
Like any fast-developing resource, the advancement of data use is subject to growing pains. As...

How Immuta’s ISO 27001/27701 Compliance is Enhancing Data Security
As the world becomes increasingly digital, data security has become a critical concern for businesses...

Why Tech Companies Should Care About Healthcare Data Breaches
Health data is one of the most valuable assets organizations in the healthcare and life...

Forrester TEI Study Shows How Immuta Can Drive 175% ROI Over 3 Years
Forrester’s new Total Economic Impact™ (TEI) study provides a detailed financial model based on interviews...

Moving from Legacy BI Extracts to Modern Data Security & Engineering
Before we can talk about modernizing from a legacy Business Intelligence (BI) extract, we need...

Buzzword Bracket: Comparing Trending Terms in Data Security
In the spirit of the NCAA March Madness tournament, we’ve decided to create a competitive...

Scaling Identity Management in Healthcare
The average hospital has seen a 90% turnover of its workforce in the last five...

Why Data Breach Detection is Crucial for Data Security
When a data breach occurs, time is of the essence. On one level, modern compliance...

Trending Towards a Data-Fueled Future: February 2023’s Key Stories
Data-driven leaders often push boundaries to steer their organizations towards more insight-driven, impactful futures. But...

Data Privacy Provisions and Penalties: January 2023’s Key Stories
Effective data security is standard for any modern data-driven business or agency. But as data...

Survey Reveals 5 Insights for Implementing Zero Trust
The concept of Zero Trust is not new, but it is gaining traction as data...

Data Security Reflections and Predictions: December 2022’s Key Stories
As common as data use has become in modern business and government, there is always...

Survey Reveals The 3 Most Common Data Engineering Challenges
Data teams are critical to the success of modern data-driven organizations. Made up of engineers,...

Structuring and Empowering Data Teams: November 2022’s Key Stories
Choosing the right data security platform is an important piece of the puzzle in regards...

Immuta Spotlight: Katie Wrabel on Guiding the Next Generation of Data Security Experts
For over four years, Katie Wrabel has managed Immuta’s Documentation and Training team. Before joining...

Data Security, Attacks, and Costly Mistakes: October 2022’s Key Stories
Large-scale approaches to maintaining cloud data security are still relatively nascent for modern organizations. As...

Immuta Spotlight: Bob Boule on SaaS Data Security Platforms for Enterprise
As more organizations continue to shift their data to the cloud, teams are often confronted...

3 Key Obstacles of Military Data Ops and What They Indicate
There are many lessons that I learned throughout my civilian and military careers, but one...

Data Breaches, Leaks, and Fines: September 2022’s Key Stories
Without effective and thorough data security measures, organizations take on quite a bit of unnecessary...

Data Innovation Goes Global: The Immuta All Access Tour
More data is created now than ever before. According to Statista, people around the world...

Immuta Spotlight: Walter Paz on Data Weaponization
Walter Paz is the Director of Customer Success, Public Sector, for Department of Defense (DoD)...

What is Data Access Management?
What is Data Access Management? Virtually all modern organizations prioritize the collection and storage of...

How to Harness the Power of The Modern Data Stack
For Dave DeWalt, Founder and Managing Director of advisory firm (and Immuta investor) NightDragon, the...

The Data Privacy Regulation Roundup: What Data Teams Need to Know
When the General Data Protection Regulation (GDPR) entered into force, US privacy law was still...

Redefining Data Sharing for Financial Services
As business continues to shift to increasingly digital environments, the aggregation and sharing of financial...

What is Policy-as-Code and Why is it Important?
In the cloud computing era, ensuring data policy is co-created with data is essential. Historically,...

Top 3 Lessons from Databricks’ 2022 Data+AI Summit
The world’s largest data and AI conference took over downtown San Francisco the last week...

3 Tips for Implementing a Future-Ready Data Security Platform
As data storage and analysis continue to migrate from on-premises to the cloud, the market...

What Types of Data Controls Are There?
Data controls refer to the tactics, policies, and procedures that organizations use to meet their...

Resilient, Agile, and Future-Ready: A Roundtable on the Modern Data Stack
The modern data stack bears the immense responsibility of storing, protecting, analyzing, and operationalizing a...

How to Comply with the Zero Trust Executive Order
A year after the White House released its Executive Order (EO) on Improving the Nation’s...

What Is Data Masking?
What Is Data Masking? Why Do I Need Data Masking? What Are Some Data Masking...

Industry Leaders Share Perspectives on the State of Cloud Adoption
With the world of data analytics and governance constantly changing, it is critical for organizations...

Modernizing From an RBAC to ABAC Model: Is It Hard?
The good news is no. The better news is you are already 90% of the...

Data Privacy Technology Is No Longer Optional – Here’s Why
The Future of Data Privacy Regulation The average person doesn’t go through life wondering which...

Gartner Hype Cycle for Privacy, 2021
News of data leaks and breaches seems to be increasingly common. While this trend is...

How the Executive Order on Zero Trust Improves the Nation’s Cybersecurity
It is something along the lines of common wisdom to describe cybersecurity as the biggest...

The Top 3 Data Supply Chain Challenges – And Their Business Impacts
Increasing demand for data and its evolving uses – particularly personal and sensitive data –...

What Is a Data Mesh?
A data mesh is an increasingly popular data architecture framework that moves away from the...

What is a Data Supply Chain?
We’re all familiar with supply chains in the realm of manufacturing. Well, the same concept...

What is Data Orchestration?
Data orchestration is the process of bringing together data from various storage locations, combining it...

The Evolution of the Modern Cloud Data Warehouse
Someone starting a small business – think custom t-shirts, candlemaking, etc. – could probably operate...

Data Intelligence vs. Data Analytics
The terms ‘data intelligence’ and ‘data analytics’ may as well be enshrined in marble for...

Immuta vs. Ranger: Research Comparison Finds Immuta’s ABAC Reduces Policy Burden by 75x
The role-based access control versus attribute-based access control debate has been going on for decades....

The Top 5 Barriers to Data Sharing and How to Overcome Them
Technology has made our world increasingly interconnected and interdependent, and as a result, the need...

Data Sharing Is a Necessity to Accelerate Digital Business
According to Gartner’s report, “By 2024, most organizations will attempt trust-based data sharing programs, but...

Your Guide to Deploying Data Access Control Using Immuta SaaS & Self-Managed
Organizations are realizing the value of data lakehouse architectures and, as a result, adoption rates...

SQL Is Your Data Mesh API
What Is a Data Mesh? As Zhamak Dehghani describes in her original article, “How to...

Data Lake Governance: What Is It and Do You Need It?
Data lakes have become essential tools for businesses in the era of Big Data. But...

How Immuta Fosters an Inclusive and Diverse Workplace
Inclusion and diversity are universally considered desirable characteristics for modern workplaces. At Immuta, our commitment...

Why Forbes Recognized Immuta as a Top American Startup Employer
We are excited to announce Forbes has recognized Immuta as one of America’s Best Startup...

How The Center for New Data Saved $1 Million with Immuta
By the time COVID-19 was classified as a pandemic, it was already spreading like wildfire....

What is Data Governance? Everything You Need to Know
Organizations are increasingly recognizing their data as a valuable asset that can significantly shape and...

3 Signs You Need a Data Engineer
Data engineers are among the most important resources an organization can have, and yet according...

Role-Based Access Control vs. Attribute-Based Access Control
The terms role-based access control and attribute-based access control are well known, but not necessarily well understood — or...

What is a Data Catalog? 5 Features of a Modern Data Catalog
Imagine going to a library in search of a specific book with a piece of...

A Call for a Risk-Based Assessment of Anonymization Approaches
Why it’s time to reexamine the binary dichotomy between personal and aggregate data, and what...

A Lawyer and A Data Scientist Start A Law Firm
At the end of my first week at Immuta, all the way back in 2016,...

A Lawyer and A Data Scientist Walk Into A Bar
Today marks the end of my first week at Immuta, and I thought I’d take...

Immuta Named One of World’s 50 Most Innovative Companies by Fast Company
Today, Immuta was named to Fast Company’s annual list of the World’s 50 Most Innovative...

Why Provisioned Access is the Key to the Right to be Forgotten
Since the Court of Justice of the European Union (EU) decided the Google Spain case...

How Policy Leaders Can Democratize Data Ethics
Now, even Facebook’s Mark Zuckerberg is calling for GDPR-like national data regulations. His goals are laudable. He...

Data Governance Anti-Patterns: Stop Conflating Who, Why, and What
(This Is Part II of Our “Data Governance Anti-Patterns Series”, Part I Can Be Found Here)....

A Former Chief Operational Risk Officer for a Global Fortune 300 Bank on Why He Joined Immuta
“How does working for a software start-up compare to working for a massive financial institution?”...

Why a Professor in Information Technology Law & Data Governance Joined Immuta
I joined the Immuta team last Monday and, since then, have been asked several times:...