April 18, 2024
Balancing Collaboration and Compliance with Data Marketplaces

Although we are living in an age of unprecedented data generation, none of it matters...

April 17, 2024
Implementing Privacy Controls for Genomics

Genomic data holds significant promise in advancing personalized medicine, streamlining disease treatments, and improving health...

April 16, 2024
Scaling Secure Data Access Management and Use with Immuta Domains

One of the most persistent challenges modern data-driven organizations face is the divide between IT...

April 9, 2024
Why Data Security is the Missing Link to Business Value

The number one performance indicator for most businesses is value. How much value will this...

March 14, 2024
Data Leaders’ Top 4 Security Trends for 2024

It’s easy to talk about trends in absolutes. “This new development will affect jobs across...

February 28, 2024
Discover Frameworks: Bridging the Gap Between Regulation & Application

“What data do we have?” Data’s entire life cycle – from collection, to analysis, to...

January 30, 2024
How to Make Data Mesh a Reality: An Implementation Roadmap

We recently conducted an intriguing webinar exploring the data mesh concept, and how it’s transforming...

January 17, 2024
3 Emerging Data Security Laws and What They Mean for You

The past few months have been particularly hectic for lawmakers across the European Union (EU)....

January 16, 2024
Unlocking Education Data Analytics for the Future of Work

It goes without saying that employee engagement is a key indicator of organizational performance –...

January 11, 2024
The Intersection of Data Security and IAM

As more capabilities become automated as part of cloud services, we find that our customers...

December 8, 2023
What Is the EU-US Data Privacy Framework & How Should You Plan?

The General Data Protection Regulation (GDPR) is one of the most wide-reaching and stringent data...

November 28, 2023
Enabling Cloud Infrastructure Security for Storage & Compute

Pushes toward self-service data use, advancements in AI, and the demand for real time, granular...

November 28, 2023
The “One Policy” Approach to Policy-Based Access Management

In his Lord of the Rings series, J.R.R. Tolkien writes of 19 rings of power...

November 14, 2023
Acceptable Use Policy for Generative AI: Where to Start? 

Generative artificial intelligence (AI) are prediction algorithms that can be leveraged to create any type...

November 9, 2023
4 Simple Steps to Mature Your Data Security Strategy

In today’s digital landscape, safeguarding your data is more important than ever. Whether you’re a...

October 31, 2023
Social vs. Technical: Leaders Weigh in on Data Mesh Challenges

Immuta CTO and Co-Founder Steve Touw sat down with Paul Rankin, Head of Data Management...

October 19, 2023
SQL: The Forgotten API

Data mesh has become a hot topic as organizations look to foster self-service analytics to...

October 19, 2023
Is Data Mesh Feasible for Highly Regulated Industries?

The concept of the data mesh architecture is widely recognized and often sought after by...

September 20, 2023
What Should Teams Expect from the EU’s Open Finance Initiative?

At the core of the European Union’s data strategy lies a well-structured framework composed of...

September 1, 2023
Securing AI Systems: AI Threat Knowledge Bases

Artificial Intelligence (AI) systems have recently gained significantly greater visibility and use by the general...

August 24, 2023
3 Solution Patterns for Data Security Success

You’ve just adopted a data security solution – congratulations! Now what? As with any new...

August 16, 2023
What’s the Worst That Could Happen? A Guide to AI Risks

While generative artificial intelligence (AI), foundation models, and Large Language Models (LLMs) are often described...

August 16, 2023
Types of AI and Input Models Explained

ChatGPT is one of the fastest-growing artificial intelligence (AI)-powered apps of all time, but it...

July 31, 2023
How to Assess and Defend Against the Cyber Threat Landscape

According to the United States’ Cybersecurity & Infrastructure Security Agency (CISA), 47% of American adults...

July 14, 2023
Exploring Data Democratization: Pros, Cons, and Real-World Impact

As data is being analyzed in new ways to deliver better insights, organizations across industries...

July 11, 2023
What is Sensitive Data and How Should I Protect It?

If you’ve done any work with data, you’ve likely heard the term “sensitive data.” Data...

Databricks + Immuta
July 6, 2023
Democratizing AI & More: 3 Takeaways from Databricks’ Data + AI Summit

The Databricks Data + AI Summit converged on downtown San Francisco for its 10th year,...

July 3, 2023
How to Mitigate Risk by Mastering Cloud Storage Security

The volume of cloud data is increasing at an exponential rate. But with this growth...

June 20, 2023
Demystifying Data Security and Privacy in the Digital Age

As data evolves, so does the threat landscape. Facing the possibilities of targeted breaches from...

May 31, 2023
Data Mesh vs. Data Fabric: What’s the Difference?

When two different concepts sound or act alike, it can be easy to conflate them....

May 24, 2023
Bans, Breaches, and Budding Regulations: May 2023’s Key Stories

Like any fast-developing resource, the advancement of data use is subject to growing pains. As...

May 22, 2023
How Immuta’s ISO 27001/27701 Compliance is Enhancing Data Security

As the world becomes increasingly digital, data security has become a critical concern for businesses...

May 3, 2023
Why Tech Companies Should Care About Healthcare Data Breaches

Health data is one of the most valuable assets organizations in the healthcare and life...

April 18, 2023
Forrester TEI Study Shows How Immuta Can Drive 175% ROI Over 3 Years

Forrester’s new Total Economic Impact™ (TEI) study provides a detailed financial model based on interviews...

April 5, 2023
Moving from Legacy BI Extracts to Modern Data Security & Engineering

Before we can talk about modernizing from a legacy Business Intelligence (BI) extract, we need...

March 29, 2023
Buzzword Bracket: Comparing Trending Terms in Data Security

In the spirit of the NCAA March Madness tournament, we’ve decided to create a competitive...

March 28, 2023
Scaling Identity Management in Healthcare

The average hospital has seen a 90% turnover of its workforce in the last five...

March 17, 2023
Why Data Breach Detection is Crucial for Data Security

When a data breach occurs, time is of the essence. On one level, modern compliance...

February 22, 2023
Trending Towards a Data-Fueled Future: February 2023’s Key Stories

Data-driven leaders often push boundaries to steer their organizations towards more insight-driven, impactful futures. But...

January 26, 2023
Data Privacy Provisions and Penalties: January 2023’s Key Stories

Effective data security is standard for any modern data-driven business or agency. But as data...

January 17, 2023
Survey Reveals 5 Insights for Implementing Zero Trust

The concept of Zero Trust is not new, but it is gaining traction as data...

December 22, 2022
The Next Generation of CCPA Compliance Requirements

The 2020 elections not only saw record turnout, but also ushered in a suite of...

December 19, 2022
Data Security Reflections and Predictions: December 2022’s Key Stories

As common as data use has become in modern business and government, there is always...

December 12, 2022
The 3 Most Common Data Engineering Challenges

Today’s data engineering teams face various challenges wrangling massive volumes of data, dispersed stakeholders with...

November 22, 2022
Structuring and Empowering Data Teams: November 2022’s Key Stories

Choosing the right data security platform is an important piece of the puzzle in regards...

Katie Wrabel
November 17, 2022
Immuta Spotlight: Katie Wrabel on Guiding the Next Generation of Data Security Experts

For over four years, Katie Wrabel has managed Immuta’s Documentation and Training team. Before joining...

October 26, 2022
Data Security, Attacks, and Costly Mistakes: October 2022’s Key Stories

Large-scale approaches to maintaining cloud data security are still relatively nascent for modern organizations. As...

Bob Boule SaaS Data Security Platform
October 24, 2022
Immuta Spotlight: Bob Boule on SaaS Data Security Platforms for Enterprise

As more organizations continue to shift their data to the cloud, teams are often confronted...

Reporting and Auditing in Databricks Using Immuta
October 7, 2022
3 Key Obstacles of Military Data Ops and What They Indicate

There are many lessons that I learned throughout my civilian and military careers, but one...

Unlocked
October 4, 2022
Data Breaches, Leaks, and Fines: September 2022’s Key Stories

Without effective and thorough data security measures, organizations take on quite a bit of unnecessary...

September 30, 2022
Data Innovation Goes Global: The Immuta All Access Tour

More data is created now than ever before. According to Statista, people around the world...

September 28, 2022
Immuta Spotlight: Walter Paz on Data Weaponization

Walter Paz is the Director of Customer Success, Public Sector, for Department of Defense (DoD)...

September 14, 2022
What is Data Access Management?

What is Data Access Management? Virtually all modern organizations prioritize the collection and storage of...

August 30, 2022
How to Harness the Power of The Modern Data Stack

For Dave DeWalt, Founder and Managing Director of advisory firm (and Immuta investor) NightDragon, the...

August 19, 2022
The Data Privacy Regulation Roundup: What Data Teams Need to Know

When the General Data Protection Regulation (GDPR) entered into force, US privacy law was still...

August 3, 2022
Redefining Data Sharing for Financial Services

As business continues to shift to increasingly digital environments, the aggregation and sharing of financial...

July 12, 2022
What is Policy-as-Code and Why is it Important?

In the cloud computing era, ensuring data policy is co-created with data is essential. Historically,...

July 11, 2022
Top 3 Lessons from Databricks’ 2022 Data+AI Summit

The world’s largest data and AI conference took over downtown San Francisco the last week...

July 8, 2022
Implementing a Data Security Platform for Cloud Storage Security

As data storage and analysis continue to migrate from on-premises frameworks to those based in...

June 30, 2022
What Types of Data Controls Are There?

Data controls refer to the tactics, policies, and procedures that organizations use to meet their...

June 13, 2022
Resilient, Agile, and Future-Ready: A Roundtable on the Modern Data Stack

The modern data stack bears the immense responsibility of storing, protecting, analyzing, and operationalizing a...

June 10, 2022
How to Comply with the Zero Trust Executive Order

Since the White House released its Executive Order (EO) on Improving the Nation’s Cybersecurity in...

Masking of Data
May 10, 2022
What Is Data Masking?

What Is Data Masking? Why Do I Need Data Masking? What Are Some Data Masking...

November 23, 2021
Industry Leaders Share Perspectives on the State of Cloud Adoption

With the world of data analytics and governance constantly changing, it is critical for organizations...

September 20, 2021
Modernizing From an RBAC to ABAC Model: Is It Hard?

The good news is no. The better news is you are already 90% of the...

August 30, 2021
Data Privacy Technology Is No Longer Optional – Here’s Why

The Future of Data Privacy Regulation The average person doesn’t go through life wondering which...

August 30, 2021
Gartner Hype Cycle for Privacy, 2021

News of data leaks and breaches seems to be increasingly common. While this trend is...

August 25, 2021
How the Executive Order on Zero Trust Improves the Nation’s Cybersecurity

It is something along the lines of common wisdom to describe cybersecurity as the biggest...

August 25, 2021
The Top 3 Data Supply Chain Challenges – And Their Business Impacts

Increasing demand for data and its evolving uses – particularly personal and sensitive data –...

August 16, 2021
What Is a Data Mesh?

A data mesh is an increasingly popular data architecture framework that moves away from the...

August 11, 2021
What is a Data Supply Chain?

We’re all familiar with supply chains in the realm of manufacturing. Well, the same concept...

August 9, 2021
What is Data Orchestration?

Data orchestration is the process of bringing together data from various storage locations, combining it...

August 2, 2021
The Evolution of the Modern Cloud Data Warehouse

Someone starting a small business – think custom t-shirts, candlemaking, etc. – could probably operate...

July 21, 2021
Data Intelligence vs. Data Analytics

The terms ‘data intelligence’ and ‘data analytics’ may as well be enshrined in marble for...

July 20, 2021
Immuta vs. Ranger: Research Comparison Finds Immuta’s ABAC Reduces Policy Burden by 75x

The role-based access control versus attribute-based access control debate has been going on for decades....

July 6, 2021
The Top 5 Barriers to Data Sharing and How to Overcome Them

Technology has made our world increasingly interconnected and interdependent, and as a result, the need...

July 1, 2021
Data Sharing Is a Necessity to Accelerate Digital Business

According to Gartner’s report, “By 2024, most organizations will attempt trust-based data sharing programs, but...

June 30, 2021
Your Guide to Deploying Data Access Control Using Immuta SaaS & Self-Managed

Organizations are realizing the value of data lakehouse architectures and, as a result, adoption rates...

June 9, 2021
SQL Is Your Data Mesh API

What Is a Data Mesh? As Zhamak Dehghani describes in her original article, “How to...

June 7, 2021
Data Lake Governance: What Is It and Do You Need It?

Data lakes have become essential tools for businesses in the era of Big Data. But...

Fostering a Diverse Workplace
May 5, 2021
How Immuta Fosters an Inclusive and Diverse Workplace

Inclusion and diversity are universally considered desirable characteristics for modern workplaces. At Immuta, our commitment...

March 26, 2021
Why Forbes Recognized Immuta as a Top American Startup Employer

We are excited to announce Forbes has recognized Immuta as one of America’s Best Startup...

February 7, 2021
How The Center for New Data Saved $1 Million with Immuta

By the time COVID-19 was classified as a pandemic, it was already spreading like wildfire....

January 20, 2021
What is Data Governance? Everything You Need to Know

Organizations are increasingly recognizing their data as a valuable asset that can significantly shape and...

October 30, 2020
3 Signs You Need a Data Engineer

Data engineers are among the most important resources an organization can have, and yet according...

October 16, 2020
Role-Based Access Control vs. Attribute-Based Access Control

The terms role-based access control and attribute-based access control are well known, but not necessarily well understood — or...

October 1, 2020
What is a Data Catalog? 5 Features of a Modern Data Catalog

Imagine going to a library in search of a specific book with a piece of...

A Call for a Risk-Based Assessment of Anonymization Approaches
August 24, 2020
A Call for a Risk-Based Assessment of Anonymization Approaches

Why it’s time to reexamine the binary dichotomy between personal and aggregate data, and what...

March 31, 2020
A Lawyer and A Data Scientist Start A Law Firm

At the end of my first week at Immuta, all the way back in 2016,...

March 31, 2020
A Lawyer and A Data Scientist Walk Into A Bar

Today marks the end of my first week at Immuta, and I thought I’d take...

March 10, 2020
Immuta Named One of World’s 50 Most Innovative Companies by Fast Company

Today, Immuta was named to Fast Company’s annual list of the World’s 50 Most Innovative...

Provisioned Access
January 30, 2020
Why Provisioned Access is the Key to the Right to be Forgotten

Since the Court of Justice of the European Union (EU) decided the Google Spain case...

April 9, 2019
How Policy Leaders Can Democratize Data Ethics

Now, even Facebook’s Mark Zuckerberg is calling for GDPR-like national data regulations. His goals are laudable. He...

January 28, 2019
Data Governance Anti-Patterns: Stop Conflating Who, Why, and What

(This Is Part II of Our “Data Governance Anti-Patterns Series”, Part I Can Be Found Here)....

January 16, 2019
A Former Chief Operational Risk Officer for a Global Fortune 300 Bank on Why He Joined Immuta

“How does working for a software start-up compare to working for a massive financial institution?”...

November 21, 2018
Why a Professor in Information Technology Law & Data Governance Joined Immuta

I joined the Immuta team last Monday and, since then, have been asked several times:...