Skip to main content
<
Page 5
>

Scanning for Arbitrary Code in Databricks Workspace With Improved Search and Audit Logs

July 19, 2022 by Arun Pamulapati and Andrew Weaver in
How can we tell whether our users are using a compromised library? How do we know whether our users are using that API...

Hunting for IOCs Without Knowing Table Names or Field Labels

There is a breach! You are an infosec incident responder and you get called in to investigate. You show up and start asking...

Databricks Now Provides HIPAA Compliance Features on Google Cloud

Customers in regulated industries rely on Databricks on Google Cloud to analyze and gain insights from their most sensitive data using the data...

Databricks now provides HIPAA, PCI-DSS, and FedRAMP Moderate compliance controls on AWS (E2 architecture)

Databricks on AWS is trusted by customers in regulated industries to analyze and gain insights from their most sensitive data utilizing the data...

Building ETL pipelines for the cybersecurity lakehouse with Delta Live Tables

Databricks recently introduced Workflows to enable data engineers, data scientists, and analysts to build reliable data, analytics, and ML workflows on any cloud...

Detecting Stale, Missing, Corrupted, and Anomalous Data in Your Lakehouse With Databricks and Anomalo

May 24, 2022 by Amy Reams and Fei Lang in
This is a collaborative post from Databricks and Anomalo. We thank Amy Reams, VP Business Development, Anomalo, for her contributions. An organization's data...

Streaming Windows Event Logs into the Cybersecurity Lakehouse

May 5, 2022 by Derek King in
Streaming windows events into the Cybersecurity Lakehouse Enterprise customers often ask, what is the easiest and simplest way to send Windows endpoint logs...

Monitoring Your Databricks Lakehouse Platform with Audit Logs

May 2, 2022 by Andrew Weaver and Silvio Fiorito in
This blog is part two of our Admin Essentials series, where we'll focus on topics that are important to those managing and maintaining...

Analyzing Okta Logs With Databricks Lakehouse Platform to Detect Unusual Activity

With the recent social media reports of an Okta incident through a third party contractor, security teams ran to their logs and asked...

Enabling Zero Trust in the NOC With Databricks and Immuta

This post was written in collaboration with Databricks partner Immuta. We thank Sam Carroll, Partner Solutions Architect, Immuta, for his contributions. Imagine you...