{"id":1925,"date":"2025-06-08T17:02:40","date_gmt":"2025-06-08T17:02:40","guid":{"rendered":"https:\/\/violethoward.com\/new\/databricks-noma-tackle-cisos-ai-inference-nightmare\/"},"modified":"2025-06-08T17:02:40","modified_gmt":"2025-06-08T17:02:40","slug":"databricks-noma-tackle-cisos-ai-inference-nightmare","status":"publish","type":"post","link":"https:\/\/violethoward.com\/new\/databricks-noma-tackle-cisos-ai-inference-nightmare\/","title":{"rendered":"Databricks, Noma Tackle CISOs\u2019 AI Inference Nightmare"},"content":{"rendered":" \r\n<br><div>\n\t\t\t\t<div id=\"boilerplate_2682874\" class=\"post-boilerplate boilerplate-before\">\n<p><em>Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy.\u00a0Learn more<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n<\/div><p>CISOs know precisely where their AI nightmare unfolds fastest. It\u2019s inference, the vulnerable stage where live models meet real-world data, leaving enterprises exposed to prompt injection, data leaks, and model jailbreaks.<\/p>\n\n\n\n<p>Databricks Ventures and Noma Security are confronting these inference-stage threats head-on. Backed by a fresh $32 million Series A round led by Ballistic Ventures and Glilot Capital, with strong support from Databricks Ventures, the partnership aims to address the critical security gaps that have hindered enterprise AI deployments.<\/p>\n\n\n\n<p>\u201cThe number one reason enterprises hesitate to deploy AI at scale fully is security,\u201d said Niv Braun, CEO of Noma Security, in an exclusive interview with VentureBeat. \u201cWith Databricks, we\u2019re embedding real-time threat analytics, advanced inference-layer protections, and proactive AI red teaming directly into enterprise workflows. Our joint approach enables organizations to accelerate their AI ambitions safely and confidently finally,\u201d Braun said.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-securing-ai-inference-demands-real-time-analytics-and-runtime-defense-gartner-finds\"><strong>Securing AI inference demands real-time analytics and runtime defense, Gartner finds<\/strong><\/h2>\n\n\n\n<p>Traditional cybersecurity prioritizes perimeter defenses, leaving AI inference vulnerabilities dangerously overlooked. Andrew Ferguson, Vice President at Databricks Ventures, highlighted this critical security gap in an exclusive interview with VentureBeat, emphasizing customer urgency regarding inference-layer security. \u201cOur customers clearly indicated that securing AI inference in real-time is crucial, and Noma uniquely delivers that capability,\u201d Ferguson said. \u201cNoma directly addresses the inference security gap with continuous monitoring and precise runtime controls.\u201d<\/p>\n\n\n\n<p>Braun expanded on this critical need. \u201cWe built our runtime protection specifically for increasingly complex AI interactions,\u201d Braun explained. \u201cReal-time threat analytics at the inference stage ensure enterprises maintain robust runtime defenses, minimizing unauthorized data exposure and adversarial model manipulation.\u201d<\/p>\n\n\n\n<p>Gartner\u2019s recent analysis confirms that enterprise demand for advanced AI Trust, Risk, and Security Management (TRiSM) capabilities is surging. Gartner predicts that through 2026, over 80% of unauthorized AI incidents will result from internal misuse rather than external threats, reinforcing the urgency for integrated governance and real-time AI security.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"709\" height=\"482\" src=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2025\/06\/figure-1.jpg\" alt=\"\" class=\"wp-image-3010405\" srcset=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2025\/06\/figure-1.jpg 709w, https:\/\/venturebeat.com\/wp-content\/uploads\/2025\/06\/figure-1.jpg?resize=300,204 300w, https:\/\/venturebeat.com\/wp-content\/uploads\/2025\/06\/figure-1.jpg?resize=400,272 400w, https:\/\/venturebeat.com\/wp-content\/uploads\/2025\/06\/figure-1.jpg?resize=578,393 578w\" sizes=\"(max-width: 709px) 100vw, 709px\"\/><\/figure>\n\n\n\n<p><em>Gartner\u2019s AI TRiSM framework illustrates comprehensive security layers essential for managing enterprise AI risk effectively. Source: Gartner<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-noma-s-proactive-red-teaming-aims-to-ensure-ai-integrity-from-the-outset\"><strong>Noma\u2019s proactive red teaming aims to ensure AI integrity from the outset<\/strong><\/h2>\n\n\n\n<p>Noma\u2019s proactive red teaming approach is strategically central to identifying vulnerabilities long before AI models reach production, Braun told VentureBeat. By simulating sophisticated adversarial attacks during pre-production testing, Noma exposes and addresses risks early, significantly enhancing the robustness of runtime protection.<\/p>\n\n\n\n<p>During his interview with VentureBeat, Braun elaborated on the strategic value of proactive red teaming: \u201cRed teaming is essential. We proactively uncover vulnerabilities pre-production, ensuring AI integrity from day one.\u201d<\/p>\n\n\n\n<p><em><strong>(Louis will be leading a roundtable about red teaming at VB Transform June 24 and 25, register today.)<\/strong><\/em><\/p>\n\n\n\n<p>\u201cReducing time to production without compromising security requires avoiding over-engineering. We design testing methodologies that directly inform runtime protections, helping enterprises move securely and efficiently from testing to deployment\u201d, Braun advised.<\/p>\n\n\n\n<p>Braun elaborated further on the complexity of modern AI interactions and the depth required in proactive red teaming methods. He stressed that this process must evolve alongside increasingly sophisticated AI models, particularly those of the generative type: \u201cOur runtime protection was specifically built to handle increasingly complex AI interactions,\u201d Braun explained. \u201cEach detector we employ integrates multiple security layers, including advanced NLP models and language-modeling capabilities, ensuring we provide comprehensive security at every inference step.\u201d<\/p>\n\n\n\n<p>The red team exercises not only validate the models but also strengthen enterprise confidence in deploying advanced AI systems safely at scale, directly aligning with the expectations of leading enterprise Chief Information Security Officers (CISOs).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-databricks-and-noma-block-critical-ai-inference-threats\"><strong>How Databricks and Noma Block Critical AI Inference Threats<\/strong><\/h2>\n\n\n\n<p>Securing AI inference from emerging threats has become a top priority for CISOs as enterprises scale their AI model pipelines. \u201cThe number one reason enterprises hesitate to deploy AI at scale fully is security,\u201d emphasized Braun. Ferguson echoed this urgency, noting, \u201cOur customers have clearly indicated securing AI inference in real-time is critical, and Noma uniquely delivers on that need.\u201d<\/p>\n\n\n\n<p>Together, Databricks and Noma offer integrated, real-time protection against sophisticated threats, including prompt injection, data leaks, and model jailbreaks, while aligning closely with standards such as Databricks\u2019 DASF 2.0 and OWASP guidelines for robust governance and compliance.<\/p>\n\n\n\n<p>The table below summarizes key AI inference threats and how the Databricks-Noma partnership mitigates them:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><td><strong>Threat Vector<\/strong><\/td><td><strong>Description<\/strong><strong\/><\/td><td><strong>Potential Impact<\/strong><strong\/><\/td><td><strong>Noma-Databricks Mitigation<\/strong><strong\/><\/td><\/tr><\/thead><tbody><tr><td><strong>Prompt Injection<\/strong><strong\/><\/td><td>Malicious inputs are overriding model instructions.<\/td><td>Unauthorized data exposure and harmful content generation.<\/td><td>Prompt scanning with multilayered detectors (Noma); Input validation via DASF 2.0 (Databricks).<\/td><\/tr><tr><td><strong>Sensitive Data Leakage<\/strong><strong\/><\/td><td>Accidental exposure of confidential data.<\/td><td>Compliance breaches, loss of intellectual property.<\/td><td>Real-time sensitive data detection and masking (Noma); Unity Catalog governance and encryption (Databricks).<\/td><\/tr><tr><td><strong>Model Jailbreaking<\/strong><strong\/><\/td><td>Bypassing embedded safety mechanisms in AI models.<\/td><td>Generation of inappropriate or malicious outputs.<\/td><td>Runtime jailbreak detection and enforcement (Noma); MLflow model governance (Databricks).<\/td><\/tr><tr><td><strong>Agent Tool Exploitation<\/strong><strong\/><\/td><td>Misuse of integrated AI agent functionalities.<\/td><td>Unauthorized system access and privilege escalation.<\/td><td>Real-time monitoring of agent interactions (Noma); Controlled deployment environments (Databricks).<\/td><\/tr><tr><td><strong>Agent Memory Poisoning<\/strong><strong\/><\/td><td>Injection of false data into persistent agent memory.<\/td><td>Compromised decision-making, misinformation.<\/td><td>AI-SPM integrity checks and memory security (Noma); Delta Lake data versioning (Databricks).<\/td><\/tr><tr><td><strong>Indirect Prompt Injection<\/strong><strong\/><\/td><td>Embedding malicious instructions in trusted inputs.<\/td><td>Agent hijacking, unauthorized task execution.<\/td><td>Real-time input scanning for malicious patterns (Noma); Secure data ingestion pipelines (Databricks).<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-databricks-lakehouse-architecture-supports-ai-governance-and-security\"><strong>How Databricks Lakehouse architecture supports AI governance and security<\/strong><\/h2>\n\n\n\n<p>Databricks\u2019 Lakehouse architecture combines traditional data warehouses\u2019 structured governance capabilities with data lakes\u2019 scalability, centralizing analytics, machine learning and AI workloads within a single, governed environment.<\/p>\n\n\n\n<p>By embedding governance directly into the data lifecycle, Lakehouse architecture addresses compliance and security risks, particularly during the inference and runtime stages. It aligns closely with industry frameworks such as OWASP and MITRE ATLAS.<\/p>\n\n\n\n<p>During our interview, Braun highlighted the platform\u2019s alignment with the stringent regulatory demands he\u2019s seeing in sales cycles and with existing customers. \u201cWe automatically map our security controls onto widely adopted frameworks like OWASP and MITRE ATLAS. This allows our customers to comply confidently with critical regulations such as the EU AI Act and ISO 42001. Governance isn\u2019t just about checking boxes. It\u2019s about embedding transparency and compliance directly into operational workflows.\u201d<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"697\" height=\"477\" src=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2025\/06\/databricks-architecture.jpg\" alt=\"\" class=\"wp-image-3010406\" srcset=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2025\/06\/databricks-architecture.jpg 697w, https:\/\/venturebeat.com\/wp-content\/uploads\/2025\/06\/databricks-architecture.jpg?resize=300,205 300w, https:\/\/venturebeat.com\/wp-content\/uploads\/2025\/06\/databricks-architecture.jpg?resize=400,274 400w, https:\/\/venturebeat.com\/wp-content\/uploads\/2025\/06\/databricks-architecture.jpg?resize=578,396 578w\" sizes=\"auto, (max-width: 697px) 100vw, 697px\"\/><\/figure>\n\n\n\n<p><em>Databricks Lakehouse integrates governance and analytics to securely manage AI workloads. Source: Gartner<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-databricks-and-noma-plan-to-secure-enterprise-ai-at-scale\"><strong>How Databricks and Noma plan to secure enterprise AI at scale<\/strong><\/h2>\n\n\n\n<p>Enterprise AI adoption is accelerating, but as deployments expand, so do security risks, especially at the model inference stage.<\/p>\n\n\n\n<p>The partnership between Databricks and Noma Security addresses this directly by providing integrated governance and real-time threat detection, with a focus on securing AI workflows from development through production.<\/p>\n\n\n\n<p>Ferguson explained the rationale behind this combined approach clearly: \u201cEnterprise AI requires comprehensive security at every stage, especially at runtime. Our partnership with Noma integrates proactive threat analytics directly into AI operations, giving enterprises the security coverage they need to scale their AI deployments confidently.\u201d<\/p>\n<div id=\"boilerplate_2660155\" class=\"post-boilerplate boilerplate-after\"><div class=\"Boilerplate__newsletter-container vb\">\n<div class=\"Boilerplate__newsletter-main\">\n<p><strong>Daily insights on business use cases with VB Daily<\/strong><\/p>\n<p class=\"copy\">If you want to impress your boss, VB Daily has you covered. We give you the inside scoop on what companies are doing with generative AI, from regulatory shifts to practical deployments, so you can share insights for maximum ROI.<\/p>\n<p class=\"Form__newsletter-legal\">Read our Privacy Policy<\/p>\n<p class=\"Form__success\" id=\"boilerplateNewsletterConfirmation\">\n\t\t\t\t\tThanks for subscribing. Check out more VB newsletters here.\n\t\t\t\t<\/p>\n<p class=\"Form__error\">An error occured.<\/p>\n<\/p><\/div>\n<div class=\"image-container\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/venturebeat.com\/wp-content\/themes\/vb-news\/brand\/img\/vb-daily-phone.png\" alt=\"\"\/>\n\t\t\t\t<\/div>\n<\/p><\/div>\n<\/div>\t\t\t<\/div>\r\n<br>\r\n<br><a href=\"https:\/\/venturebeat.com\/security\/databricks-noma-tackle-cisos-ai-inference-nightmare\/\">Source link <\/a>","protected":false},"excerpt":{"rendered":"<p>Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy.\u00a0Learn more CISOs know precisely where their AI nightmare unfolds fastest. It\u2019s inference, the vulnerable stage where live models meet real-world data, leaving enterprises exposed to prompt injection, data leaks, and model jailbreaks. Databricks [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1926,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[33],"tags":[],"class_list":["post-1925","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-automation"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/violethoward.com\/new\/wp-content\/uploads\/2025\/06\/HERO-IMAGE-FOR-DATABRICKS-AND-NOMA-SECURITY-STORY.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/violethoward.com\/new\/wp-json\/wp\/v2\/posts\/1925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/violethoward.com\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/violethoward.com\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/violethoward.com\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/violethoward.com\/new\/wp-json\/wp\/v2\/comments?post=1925"}],"version-history":[{"count":0,"href":"https:\/\/violethoward.com\/new\/wp-json\/wp\/v2\/posts\/1925\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/violethoward.com\/new\/wp-json\/wp\/v2\/media\/1926"}],"wp:attachment":[{"href":"https:\/\/violethoward.com\/new\/wp-json\/wp\/v2\/media?parent=1925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/violethoward.com\/new\/wp-json\/wp\/v2\/categories?post=1925"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/violethoward.com\/new\/wp-json\/wp\/v2\/tags?post=1925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69e302c146fa5c92dc28ac12. Config Timestamp: 2026-04-18 04:04:16 UTC, Cached Timestamp: 2026-04-29 09:42:54 UTC -->