{"id":1199,"date":"2020-12-11T11:00:00","date_gmt":"2020-12-11T16:00:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1199"},"modified":"2020-12-10T21:18:39","modified_gmt":"2020-12-11T02:18:39","slug":"fireeye-breach-forces-businesses-to-review-security","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/","title":{"rendered":"FireEye Breach Forces Businesses to Review Security"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-earlier-this-week-fireeye-announced-a-breach-and-theft-of-red-team-tools-businesses-must-act-now-to-mitigate-risk-and-maintain-security\">Earlier this week, FireEye announced a breach and theft of Red Team tools. Businesses must act now to mitigate risk and maintain security.<\/h2>\n\n\n\n<p>Security, specifically cybersecurity and application security, has made headlines a LOT over the last several months. Attacks have been on the rise and it seems that researchers are finding vulnerabilities and configuration problems left and right. Businesses are taking notice, business leaders are realizing how much security matters and why it\u2019s a good idea to get that review in before the end of the year. Especially now, since <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/12\/unauthorized-access-of-fireeye-red-team-tools.html\" target=\"_blank\" rel=\"noreferrer noopener\">U.S. cybersecurity company FireEye announced it suffered a breach<\/a> earlier this week.<\/p>\n\n\n\n<p>From FireEye\u2019s blog post announcing the breach:<\/p>\n\n\n\n<p>\u201cA highly sophisticated state-sponsored adversary stole FireEye Red Team tools. Because we believe that an adversary possesses these tools, and we do not know whether the attacker intends to use the stolen tools themselves or publicly disclose them, FireEye is releasing hundreds of countermeasures with this blog post to enable the broader security community to protect themselves against these tools. We have incorporated the countermeasures in our FireEye products\u2014and shared <a href=\"https:\/\/github.com\/fireeye\/red_team_tool_countermeasures\" target=\"_blank\" rel=\"noreferrer noopener\">these countermeasures<\/a> with partners, government agencies\u2014to significantly limit the ability of the bad actor to exploit the Red Team tools.\u201d<\/p>\n\n\n\n<p>The good news is that FireEye states that no zero-day exploits were stolen, which means that the information that was stolen has well-documented fixes and mitigation for businesses. That also means that businesses MUST make sure that all patching and updating of security measures is taking place as soon as that information is released. In this instance, many of the Red Team tools have already been released to the community and can also be found in FireEye\u2019s <a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/fireeye\/commando-vm\" target=\"_blank\">CommandoVM<\/a>.\u00a0<\/p>\n\n\n\n<p>Combine this incident with the <a href=\"https:\/\/www.pwvconsultants.com\/blog\/cloudflare-vulnerability-reveals-need-for-depth\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cloudflare vulnerability<\/a>, and we now have proof that layers in security matter. You simply cannot rely on one tool to protect your entire business from every attack possible. It\u2019s better to partner solutions and tools together so that they support each other and create multiple barriers around your business and its information. We also mentioned the other day that this is equally important in all areas of coding, not just security. If you are configuring something, creating something, protecting something or manipulating code of any kind, your best bet is to be diligent at every layer. Independent well coded layers within your system will help your systems and security remain stable and functioning, relieving the burden on a single tool or a single layer of your stack to do it all alone.<\/p>\n\n\n\n<p>This breach should be a huge warning sign, a flare in the sky for businesses everywhere. If you haven\u2019t taken notice of security yet, now is the time. FireEye believes they were hit by a nation state, likely Russia or Iran (<a rel=\"noreferrer noopener\" href=\"https:\/\/www.reuters.com\/article\/us-fireeye-cyber-idUSKBN28I31E\" target=\"_blank\">per Reuters<\/a>) and while the stolen tools aren\u2019t zero-day exploits, businesses still need to ensure that they have done any patching or updating needed. Just because those have been released for use doesn\u2019t mean they have been implemented. Remember, many business leaders will tell security teams to fix it \u201clater,\u201d as if \u201clater\u201d makes it cheaper or easier to fix. Later is here now, which means security needs to be addressed today.<\/p>\n\n\n\n<p>The number one thing you can do for your business as a leader is handle security, which also means code quality, properly. This means it doesn\u2019t get pushed back or set aside, it means it\u2019s handled nearly immediately. If your team is too busy or you don\u2019t have the right talent on staff, always, always, always <a href=\"https:\/\/www.pwvconsultants.com\/blog\/why-hiring-an-expert-is-crucial-to-success\/\" target=\"_blank\" rel=\"noreferrer noopener\">consult and\/or hire an expert<\/a>! We say this often, but it is so very true. Experts are specialists, their reputation and therefore their business is staked on their ability to provide quality work. You wouldn\u2019t hire a drywall specialist to build a skyscraper, you need an architect. The same applies with security, it is the foundation of your business.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.pwvconsultants.com\/blog\/efficiency-and-productivity-loss-in-remote-work\/\" target=\"_blank\" rel=\"noreferrer noopener\">The era of remote work<\/a> has strained not just the security community, but the global economy. Security also directly impacts the global economy, every breach has a ripple effect and it takes time to see where that leads. If you\u2019re a business leader, stop pushing security to the backburner and make it a priority. Not only is it vital to the success of the business, but it also directly impacts your livelihood. It\u2019s important, it matters and it should be taken seriously from day one of a business. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Top U.S. Cybersecurity firm FireEye reports breach, theft of red team tools. This is a wake up call for businesses to address security now.<\/p>\n","protected":false},"author":1,"featured_media":1206,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1969,14],"tags":[709,36,1569,2009,602,2007,1910,31,2005,2006,2008,1992,2004,17,487],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>FireEye Breach Forces Businesses to Review Security - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Top U.S. Cybersecurity firm FireEye reports breach, theft of red team tools. This is a wake up call for businesses to address security now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FireEye Breach Forces Businesses to Review Security\" \/>\n<meta property=\"og:description\" content=\"Top U.S. Cybersecurity firm FireEye reports breach, theft of red team tools. This is a wake up call for businesses to address security now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-11T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-11T02:18:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/binary-2170633_1920.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1247\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"FireEye Breach Forces Businesses to Review Security\",\"datePublished\":\"2020-12-11T16:00:00+00:00\",\"dateModified\":\"2020-12-11T02:18:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/\"},\"wordCount\":755,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/binary-2170633_1920.png\",\"keywords\":[\"breach\",\"Business\",\"code\",\"code quality\",\"Coding\",\"Countermeasures\",\"CyberSec\",\"Cybersecurity\",\"FireEye\",\"Hack\",\"Mitigation\",\"patching\",\"Red Team tools\",\"Security\",\"update\"],\"articleSection\":[\"Business\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/\",\"name\":\"FireEye Breach Forces Businesses to Review Security - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/binary-2170633_1920.png\",\"datePublished\":\"2020-12-11T16:00:00+00:00\",\"dateModified\":\"2020-12-11T02:18:39+00:00\",\"description\":\"Top U.S. Cybersecurity firm FireEye reports breach, theft of red team tools. This is a wake up call for businesses to address security now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/binary-2170633_1920.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/binary-2170633_1920.png\",\"width\":1920,\"height\":1247,\"caption\":\"Image by Gerd Altmann from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"FireEye Breach Forces Businesses to Review Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"FireEye Breach Forces Businesses to Review Security - PWV Consultants","description":"Top U.S. Cybersecurity firm FireEye reports breach, theft of red team tools. This is a wake up call for businesses to address security now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/","og_locale":"en_US","og_type":"article","og_title":"FireEye Breach Forces Businesses to Review Security","og_description":"Top U.S. Cybersecurity firm FireEye reports breach, theft of red team tools. This is a wake up call for businesses to address security now.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-12-11T16:00:00+00:00","article_modified_time":"2020-12-11T02:18:39+00:00","og_image":[{"width":1920,"height":1247,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/binary-2170633_1920.png","type":"image\/png"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"FireEye Breach Forces Businesses to Review Security","datePublished":"2020-12-11T16:00:00+00:00","dateModified":"2020-12-11T02:18:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/"},"wordCount":755,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/binary-2170633_1920.png","keywords":["breach","Business","code","code quality","Coding","Countermeasures","CyberSec","Cybersecurity","FireEye","Hack","Mitigation","patching","Red Team tools","Security","update"],"articleSection":["Business","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/","url":"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/","name":"FireEye Breach Forces Businesses to Review Security - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/binary-2170633_1920.png","datePublished":"2020-12-11T16:00:00+00:00","dateModified":"2020-12-11T02:18:39+00:00","description":"Top U.S. Cybersecurity firm FireEye reports breach, theft of red team tools. This is a wake up call for businesses to address security now.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/binary-2170633_1920.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/binary-2170633_1920.png","width":1920,"height":1247,"caption":"Image by Gerd Altmann from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"FireEye Breach Forces Businesses to Review Security"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1199"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1199"}],"version-history":[{"count":2,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1199\/revisions"}],"predecessor-version":[{"id":1207,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1199\/revisions\/1207"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1206"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}