{"id":1258,"date":"2017-10-04T12:19:36","date_gmt":"2017-10-04T12:19:36","guid":{"rendered":"http:\/\/54.201.249.27\/?p=1258"},"modified":"2017-10-04T12:19:36","modified_gmt":"2017-10-04T12:19:36","slug":"hp-enterprise-shared-pentagons-cyberdefense-source-code-russia","status":"publish","type":"post","link":"https:\/\/blackopspartners.com\/hp-enterprise-shared-pentagons-cyberdefense-source-code-russia\/","title":{"rendered":"HP Enterprise Shared Pentagon\u2019s Cyberdefense Source Code With Russia"},"content":{"rendered":"
HP Enterprise shared at least some of the source code used in the Pentagon\u2019s cybersecurity defense systems with Russian defense agencies, Reuters reports<\/a>,\u00a0in a bid to win their business. The system in question, ArcSight, is designed to analyze cybersecurity threats, rank them by severity, stream and log real-time network data, provide end-to-end network and security monitoring, and to simplify the audit process.<\/p>\n Russian regulatory records and an ArcSight spokesperson confirmed the Russians were given access to the company\u2019s source code, the report said, though they didn\u2019t state how much of the source code was revealed, or under what conditions the Russians were allowed to analyze it.<\/p>\n \u201cIt\u2019s a huge security vulnerability,\u201c Greg Martin, a former security architect for ArcSight, told Reuters. \u201dYou are definitely giving inner access and potential exploits to an adversary.\u201d<\/p>\n The review was conducted by Echelon, a Russian company with close ties to the Russian military. Echelon\u2019s president, Alexey Markov, confirmed he is required to report any backdoors or security vulnerabilities he finds to the Russian government, though Markov also stated he would first notify the software developer and receive permission from it to disclose the vulnerability in question.<\/p>\n