Skip to main content
<
Page 5
>

Databricks Now Provides HIPAA Compliance Features on Google Cloud

Customers in regulated industries rely on Databricks on Google Cloud to analyze and gain insights from their most sensitive data using the data...

Databricks now provides HIPAA, PCI-DSS, and FedRAMP Moderate compliance controls on AWS (E2 architecture)

Databricks on AWS is trusted by customers in regulated industries to analyze and gain insights from their most sensitive data utilizing the data...

Building ETL pipelines for the cybersecurity lakehouse with Delta Live Tables

Databricks recently introduced Workflows to enable data engineers, data scientists, and analysts to build reliable data, analytics, and ML workflows on any cloud...

Detecting Stale, Missing, Corrupted, and Anomalous Data in Your Lakehouse With Databricks and Anomalo

May 24, 2022 by Amy Reams and Fei Lang in
This is a collaborative post from Databricks and Anomalo. We thank Amy Reams, VP Business Development, Anomalo, for her contributions. An organization's data...

Streaming Windows Event Logs into the Cybersecurity Lakehouse

May 5, 2022 by Derek King in
Streaming windows events into the Cybersecurity Lakehouse Enterprise customers often ask, what is the easiest and simplest way to send Windows endpoint logs...

Monitoring Your Databricks Lakehouse Platform with Audit Logs

This blog is part two of our Admin Essentials series, where we'll focus on topics that are important to those managing and maintaining...

Analyzing Okta Logs With Databricks Lakehouse Platform to Detect Unusual Activity

With the recent social media reports of an Okta incident through a third party contractor, security teams ran to their logs and asked...

Enabling Zero Trust in the NOC With Databricks and Immuta

This post was written in collaboration with Databricks partner Immuta. We thank Sam Carroll, Partner Solutions Architect, Immuta, for his contributions. Imagine you...

OMB M-21-31: A Cost-Effective Alternative to Meeting and Exceeding Traditional SIEMs With Databricks

February 3, 2022 by Monzy Merza in
On August 29, 2021, the U.S. Office of Management and Budget (OMB) released a memo in accordance with the Biden Administration’s Executive Order...

Hunting Anomalous Connections and Infrastructure With TLS Certificates

January 20, 2022 by Derek King in
According to Sophos, 46% of all malware now uses Transport Layer Security (TLS) to conceal its communication channels. A number that has doubled...