Skip to main content
<
Page 4
>

Monitoring Notebook Command Logs With Static Analysis Tools

November 1, 2022 by Silvio Fiorito in
Background Code review and static analysis tools are standard practices in the Software Development Lifecycle (SDLC). Static analysis tools help developers find code...

Announcing the Security Analysis Tool (SAT)

At Databricks, we know that data is one of the most valuable assets to organizations and that protecting it is a top priority...

Admin Isolation on Shared Clusters

October 9, 2022 by David Meyer and Joosua Santasalo in
This blog was co-authored by David Meyer, SVP Product Management at Databricks and Joosua Santasalo, a security researcher with Secureworks. At Databricks, we...

Using Enhanced Security Monitoring to Detect & Alert for Suspicious Activity on Your Databricks Clusters

September 1, 2022 by Silvio Fiorito in
Databricks on AWS relies on custom machine images, AMIs, deployed as EC2 instances in the customer’s account. These EC2 instances provide the elastic...

Cybersecurity in the Era of Multiple Clouds and Regions

In 2021, more than three quarters of all enterprises have infrastructure in multiple clouds . This trend shows no signs of slowdown with...

Restricting Libraries in JVM Compute Platforms

August 23, 2022 by Thomas Garnier in
Security challenges with Scala and Java libraries Open source communities have built incredibly useful libraries. They simplify many common development scenarios. Through our...

Near Real-Time Anomaly Detection with Delta Live Tables and Databricks Machine Learning

Why is Anomaly Detection Important? Whether in retail, finance, cyber security, or any other industry, spotting anomalous behavior as soon as it happens...

Automating ML, Scoring, and Alerting for Detecting Criminals and Nation States Through DNS Analytics

August 2, 2022 by Arun Pamulapati in
This blog is part two of our DNS Analytics blog, where you learned how to detect a remote access trojan using passive DNS...

Security Best Practices for Delta Sharing

Update: Delta Sharing is now generally available on AWS and Azure. The data lakehouse has enabled us to consolidate our data management architectures...

Building a Cybersecurity Lakehouse for CrowdStrike Falcon Events Part II

July 19, 2022 by Aemro Amare, Alex Ott and Kristin Waters in
Visibility is critical when it comes to cyber defense – you can't defend what you can't see. In the context of a modern...