Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Government //


03:22 PM
Dark Reading
Dark Reading
Products and Releases

HBGary Federal And Palantir Technologies Partner To Provide Enhanced Cyber-based Threat Intelligence

Aim is to help federal government better protect our national cyber infrastructure

Washington, D.C.--- January 25, 2010 -- Today HBGary Federal, a leading provider of expert classified cybersecurity services to the Department of Defense, Intelligence Community and other U.S. government agencies, announced a new partnership with Palantir Technologies. Together, HBGary Federal and Palantir will provide enhanced threat intelligence, including the origin of today's global cybersecurity threats, so the federal government can better protect our national cyber infrastructure.

"It is our vision to bring together the best cyber intelligence and analysis technologies with some of the brightest malware and threat intelligence analysts and develop a cooperative capability that can make significant contributions to the national capabilities in threat intelligence and attribution," said Aaron Barr, CEO of HBGary Federal. "Palantir is well-respected in the government market and is a natural partner for us."

Every day thousands of malware variants attack and infiltrate our national cyber infrastructure. As a result, the federal government is looking for the necessary threat intelligence to determine which threats pose the most danger and plan the right courses of action for mission assurance. By leveraging HBGary's advanced malware analysis technologies and Palantir's leading analysis toolsuite, HBGary Federal's trained threat and malware analysts can better organize and analyze malware and threat data to provide more granular threat intelligence to its government customers.

"Our customers have found it difficult to integrate all their disparate network information along with contextual information to detect and block advanced attacks," said Shreyas Vijaykumar, Palantir's Cyber Security Lead. "Palantir's ability to integrate this data coupled with HBGary's renowned forensics capability presents a compelling cybersecurity solution to government and private sector customers. We look forward to working closely with our partners at HBGary Federal in this critical security domain."

About HBGary Federal

HBGary Federal was founded in 2009 by former Northrop Grumman employees and military veterans, Aaron Barr and Ted Vera. HBGary Federal is focused on delivering HBGary's best-in-class malware analysis and incident response products and expert classified services to the Department of Defense, Intelligence Community and other U.S. government agencies to meet their unique, extremely dynamic cybersecurity challenges and requirements. HBGary Federal has offices in Washington D.C. and Colorado Springs offices, respectively. For more information on HBGary Federal, please visit http://www.hbgary.com.

About Palantir

The company's two products, Palantir Government and Palantir Finance, are platforms that encompass the entire analysis stack, including data integration, search & discovery, knowledge management, and collaboration across the enterprise. The platforms support many kinds of data including structured, unstructured, relational, temporal, and geospatial,. Palantir's products are core components of any organization's intelligence infrastructure built for real-time analysis with a focus on security, scalability, ease of use, and collaboration.

Palantir is headquartered in Palo Alto, CA with offices in Tyson's Corner, VA.

Karen Burke

On Behalf of HBGary Federal


Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-28
IBM MQ 7.5, 8.0, 9.0, 9.1, 9.2 LTS, and 9.2 CD could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization of trusted data. An attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 186509.
PUBLISHED: 2021-01-28
IBM QRadar SIEM 7.4.0 to 7.4.2 Patch 1 and 7.3.0 to 7.3.3 Patch 7 could allow a remote attacker to execute arbitrary commands on the system, caused by insecure deserialization of user-supplied content by the Java deserialization function. By sending a malicious serialized Java object, an attacker co...
PUBLISHED: 2021-01-28
A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can...
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.