Skip to main content
Page 1
>

Responsible AI with the Databricks Data Intelligence Platform

The transformative potential of artificial intelligence (AI) is undeniable. From productivity efficiency, to cost savings, and improved decision-making across all industries, AI is...

Deploying Third-party models securely with the Databricks Data Intelligence Platform and HiddenLayer Model Scanner

Introduction The ability for organizations to adopt machine learning, AI, and large language models (LLMs) has accelerated in recent years thanks to the...

Introducing the Databricks AI Security Framework (DASF)

We are excited to announce the release of the Databricks AI Security Framework (DASF) version 1.0 whitepaper! The framework is designed to improve...

Managing AI Security Risks: A workshop for CISOs

Adopting AI is existentially vital for most businesses Machine Learning (ML) and generative AI (GenAI) are revolutionizing the future of work. Organizations understand...

Security best practices for the Databricks Lakehouse Platform

Your data security is our priority At Databricks, we know that data is one of your most valuable assets and always has to...

Announcing Multi-Cloud support for Security Analysis Tool (SAT)

Last November, we announced the availability of the Security Analysis Tool (SAT) for AWS on our blog . Today we are excited to...

Announcing the Security Analysis Tool (SAT)

At Databricks, we know that data is one of the most valuable assets to organizations and that protecting it is a top priority...

Automating ML, Scoring, and Alerting for Detecting Criminals and Nation States Through DNS Analytics

August 2, 2022 by Arun Pamulapati in
This blog is part two of our DNS Analytics blog, where you learned how to detect a remote access trojan using passive DNS...

Scanning for Arbitrary Code in Databricks Workspace With Improved Search and Audit Logs

How can we tell whether our users are using a compromised library? How do we know whether our users are using that API...

Analyzing Okta Logs With Databricks Lakehouse Platform to Detect Unusual Activity

With the recent social media reports of an Okta incident through a third party contractor, security teams ran to their logs and asked...