{"id":1077,"date":"2020-11-13T10:00:00","date_gmt":"2020-11-13T15:00:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1077"},"modified":"2020-11-12T16:40:30","modified_gmt":"2020-11-12T21:40:30","slug":"configuration-of-data-storage-solutions-is-important","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/","title":{"rendered":"Configuration of Data Storage Solutions is Important"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">With cyberattacks (and breaches) on the rise, businesses must ensure information is properly secured. Cloud Hospitality, developed by Prestige Software, is the latest company to use improper configuration on their storage solution.<\/h2>\n\n\n\n<p>For a long time we have talked about ensuring proper configuration when using cloud services. This keeps your sensitive and private information secure, as well as keeps business costs down and keeps systems running efficiently. Configuration of any cloud service is important, but storage solutions matter the most. Why? Because a misconfigured storage solution can lead to a plethora of problems. Just ask Prestige Software, developer of Cloud Hospitality, a platform that hotels can use to integrate booking with sites like Expedia and Hotels.com. Prestige is just the latest in a line of companies with misconfigurations leading to data exposure.<\/p>\n\n\n\n<p>A security team at Website Planet is responsible for the discovery of the latest misconfiguration problem. The team found the Amazon Web Services S3 bucket was easily accessible, exposing 10 million records (over 24GB of data). Some of the records dated back to 2013, even though the bucket was \u201clive\u201d and in use when it was discovered. The information inside the bucket included full names, email addresses, national ID numbers and phone numbers of hotel guests. It also included credit card numbers, CVVs and expiration dates, cardholder names and reservation details like cost, dates, special requests made, number of people, etc.<\/p>\n\n\n\n<p>\u201cThe company was storing years of credit-card data from hotel guests and travel agents without any protection in place, putting millions of people at risk of fraud and online attacks,\u201d <a href=\"https:\/\/www.websiteplanet.com\/blog\/prestige-soft-breach-report\/\">according to Website Planet<\/a>. \u201cThe S3 bucket contained over 180,000 records from August 2020 alone. Many of them related to hotel reservations being made on numerous websites, despite global hotel bookings being at an all-time low for this period.\u201d<\/p>\n\n\n\n<p>The firm also stated that it is probable that every website and booking platform connected to Cloud Hospitality is affected. The good news for those websites and hotels is that they aren\u2019t the ones on the hook for this, Prestige Software holds the blame here. The company is subject to GDPR and PCI DSS regulations, which may bring large fines on top of any legal fees the company faces. They can look to <a href=\"https:\/\/www.pwvconsultants.com\/blog\/what-corporations-should-learn-from-capital-one\/\" target=\"_blank\" rel=\"noreferrer noopener\">Capital One<\/a> for an idea of what that fine might look like. Non-compliance to PCI DSS could result in losing the ability to accept and process credit card payments, although an investigation will have to happen before any punishment is acted upon.<\/p>\n\n\n\n<p>While this is bad, really bad especially from a PR perspective for Prestige, they are not alone. Last month Pfizer was discovered to have leaked private medical data of prescription drug users in the U.S. due to an unprotected Google Cloud storage bucket. Broadvoice, a VoIP provider, leaked more than 350 million customer records. Razer, which sells high-end gaming gear, had around 100,000 customers information exposed due to a misconfigured Elasticsearch server.<\/p>\n\n\n\n<p>On top of this, <a href=\"https:\/\/threatpost.com\/google-cloud-buckets-exposed-misconfiguration\/159429\/\">a September analysis by Comparitch<\/a> found that a large percentage of cloud databases that contain private and sensitive information are publicly available. They showed that 6% of all Google Cloud buckets are misconfigured and left open to the public internet.<\/p>\n\n\n\n<p>Configuration is incredibly important to security. We recently discussed the top three security misses we have seen, and one of the examples was around misconfiguration of storage buckets in the cloud. In the past, we have also talked about the <a href=\"https:\/\/www.pwvconsultants.com\/blog\/the-characteristics-of-a-good-data-storage-solution\/\" target=\"_blank\" rel=\"noreferrer noopener\">characteristics of a split data storage solution<\/a> and several articles have mentioned the need to <a href=\"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/\" target=\"_blank\" rel=\"noreferrer noopener\">keep sensitive and private information secure<\/a>. As a business, you are on the hook for anything that happens on your company equipment. If there is a breach, the business is on the hook. There are legal fees, reparations, labor costs for fixing the problem and fines from compliance bodies.<\/p>\n\n\n\n<p>Configuration is probably even more important to security than IAM controls, although both are vital pieces. This isn\u2019t something you mess around with, something you trust just anyone to do. Especially when dealing with cloud services, you must hire an expert. You may think you\u2019ve done everything correctly and that your IT department has it under control, and you could be right. But what harm is there in bringing in an expert to verify that everything is correct? The cost of bringing someone in, even just to look, will be far less than the cost of a breach. Not just that, but a breach can mar a business&#8217; reputation for years to come, which is why most small-medium and even some larger businesses do not survive after exposing information. Don\u2019t be the next Capital One or Pfizer or Prestige. Protect your customers, your business and your employees by ensuring your data storage solution is secure and not part of a public bucket!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud storage solutions must have proper configuration to be effective. Private information should never be stored in a public bucket!<\/p>\n","protected":false},"author":1,"featured_media":1080,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[3,1948,5],"tags":[1609,1061,18,1957,1953,1949,1910,31,1207,1954,1950,1956,1952,1955,1951,17],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Configuration of Data Storage Solutions is Important - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Cloud storage solutions must have proper configuration to be effective. Private information should never be stored in a public bucket!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Configuration of Data Storage Solutions is Important\" \/>\n<meta property=\"og:description\" content=\"Cloud storage solutions must have proper configuration to be effective. Private information should never be stored in a public bucket!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-13T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-12T21:40:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/reception-676337_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Configuration of Data Storage Solutions is Important\",\"datePublished\":\"2020-11-13T15:00:00+00:00\",\"dateModified\":\"2020-11-12T21:40:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/\"},\"wordCount\":805,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/reception-676337_1920.jpg\",\"keywords\":[\"Amazon Web Services\",\"AWS\",\"Cloud\",\"Cloud Configuration\",\"Cloud Hospitality\",\"Configuration\",\"CyberSec\",\"Cybersecurity\",\"Google Cloud\",\"Hotel\",\"Misconfiguration\",\"Online Reservations\",\"Prestige Software\",\"Reservations\",\"S3 Bucket\",\"Security\"],\"articleSection\":[\"Cloud\",\"Configuration\",\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/\",\"name\":\"Configuration of Data Storage Solutions is Important - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/reception-676337_1920.jpg\",\"datePublished\":\"2020-11-13T15:00:00+00:00\",\"dateModified\":\"2020-11-12T21:40:30+00:00\",\"description\":\"Cloud storage solutions must have proper configuration to be effective. Private information should never be stored in a public bucket!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/reception-676337_1920.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/reception-676337_1920.jpg\",\"width\":1920,\"height\":1280,\"caption\":\"Image by Hermann Traub from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Configuration of Data Storage Solutions is Important\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Configuration of Data Storage Solutions is Important - PWV Consultants","description":"Cloud storage solutions must have proper configuration to be effective. Private information should never be stored in a public bucket!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/","og_locale":"en_US","og_type":"article","og_title":"Configuration of Data Storage Solutions is Important","og_description":"Cloud storage solutions must have proper configuration to be effective. Private information should never be stored in a public bucket!","og_url":"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-11-13T15:00:00+00:00","article_modified_time":"2020-11-12T21:40:30+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/reception-676337_1920.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Configuration of Data Storage Solutions is Important","datePublished":"2020-11-13T15:00:00+00:00","dateModified":"2020-11-12T21:40:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/"},"wordCount":805,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/reception-676337_1920.jpg","keywords":["Amazon Web Services","AWS","Cloud","Cloud Configuration","Cloud Hospitality","Configuration","CyberSec","Cybersecurity","Google Cloud","Hotel","Misconfiguration","Online Reservations","Prestige Software","Reservations","S3 Bucket","Security"],"articleSection":["Cloud","Configuration","Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/","url":"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/","name":"Configuration of Data Storage Solutions is Important - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/reception-676337_1920.jpg","datePublished":"2020-11-13T15:00:00+00:00","dateModified":"2020-11-12T21:40:30+00:00","description":"Cloud storage solutions must have proper configuration to be effective. Private information should never be stored in a public bucket!","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/reception-676337_1920.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/reception-676337_1920.jpg","width":1920,"height":1280,"caption":"Image by Hermann Traub from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Configuration of Data Storage Solutions is Important"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1077"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1077"}],"version-history":[{"count":2,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1077\/revisions"}],"predecessor-version":[{"id":1081,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1077\/revisions\/1081"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1080"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1077"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1077"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1077"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}