{"id":1239,"date":"2020-12-23T13:44:56","date_gmt":"2020-12-23T18:44:56","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1239"},"modified":"2020-12-23T13:44:58","modified_gmt":"2020-12-23T18:44:58","slug":"critical-vulnerabilities-found-in-public-docker-hub-images","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/","title":{"rendered":"Critical Vulnerabilities Found in Public Docker Hub Images"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-misconfiguration-of-docker-containers-continues-to-harbor-critical-vulnerabilities-a-recent-study-shows-public-docker-hub-images-are-contributing-to-the-problem\">Misconfiguration of Docker containers continues to harbor critical vulnerabilities. A recent study shows public Docker Hub images are contributing to the problem.<\/h2>\n\n\n\n<p>Earlier this month, we wrote about a <a href=\"https:\/\/www.pwvconsultants.com\/blog\/configuration-matters-in-securing-data-storage\/\" target=\"_blank\" rel=\"noreferrer noopener\">Docker container vulnerability due to misconfiguration<\/a>. Blackrota entered the scene, designed to exploit the exact vulnerabilities that the misconfigured containers had. Around the same time, Prevasio released the results of \u201cOperation \u201cRed Kangaroo\u201d: Industry\u2019s First Dynamic Analysis of 4M Public Docker Hub Images, and the findings were dismal. Over half of the images that were analyzed had critical vulnerabilities.<a href=\"\"><\/a><\/p>\n\n\n\n<p>From <a href=\"https:\/\/blog.prevasio.com\/2020\/12\/operation-red-kangaroo-industrys-first.html\" target=\"_blank\" rel=\"noreferrer noopener\">Prevasio\u2019s report<\/a>:<\/p>\n\n\n\n<p>\u201cIn order to handle such a massive volume of images, Prevasio Analyzer was executed non-stop for a period of one month on 800 machines running in parallel.<\/p>\n\n\n\n<p>The result of our dynamic scan reveals that:<\/p>\n\n\n\n<ul><li>51 percent of all containers had &#8220;critical&#8221; vulnerabilities, while 13 percent were classified as &#8220;high&#8221; and four percent as &#8220;moderate&#8221; vulnerabilities.<\/li><li>Six thousand containers were riddled with cryptominers, hacking tools\/pen testing frameworks, and backdoor trojans. While many cryptominers and hacking tools may not be malicious per se, they present a potentially unwanted issue to an enterprise.<\/li><li>More than 400 container images (with nearly 600,000 pulls) of weaponized Windows malware crossing over into the world of Linux. This crossover is directly due to the proliferation of cross-platform code (e.g. GoLang, .NET Core and PowerShell Core).<\/li><\/ul>\n\n\n\n<p>Our analysis of malicious containers also shows that quite a few images contain a dynamic payload. That is, an image in its original form does not have a malicious binary. However, at runtime, it might be scripted to download a source of a coinminer, to then compile and execute it.\u201d<\/p>\n\n\n\n<p>This is a really big problem. It\u2019s clear that threat actors already know this issue exists, and have known for some time. The Docker Hub accounts for over 4 million images, which are expected to top 100 million downloads in 2020. How many companies have used these images? How many businesses are losing money they didn\u2019t know they were losing? What will the extent of the damage from this look like when all is said and done? Unfortunately, it\u2019s going to be a very long time before we have those answers. The impact will be far-reaching and likely costly.<\/p>\n\n\n\n<p>This discovery illustrates another reason we say that <a href=\"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/\" target=\"_blank\" rel=\"noreferrer noopener\">configuration matters<\/a>, and why <a href=\"https:\/\/www.pwvconsultants.com\/blog\/all-open-sourced-code-should-be-reviewed\/\" target=\"_blank\" rel=\"noreferrer noopener\">code should be reviewed<\/a> when it\u2019s publicly available. It\u2019s why we say that <a href=\"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-is-ethical-hacking\/\" target=\"_blank\" rel=\"noreferrer noopener\">testing matters<\/a>, and why we say that <a href=\"https:\/\/www.pwvconsultants.com\/blog\/why-hiring-an-expert-is-crucial-to-success\/\" target=\"_blank\" rel=\"noreferrer noopener\">bringing in an expert is always a good idea<\/a>, someone who can verify that your configuration looks good, your code is clean and stable and secure, and to test products before they are launched. An outside pair of eyes is always going to catch something your own team doesn\u2019t see, and it\u2019s because they spend so much time looking at it. Finding those misses is imperative to the security of your business.<\/p>\n\n\n\n<p>Security isn\u2019t just about firewalls, protocols, hackers, incident responses and magical voodoo. It\u2019s configuration, solid code, proper testing, diligence, vigilance, and properly training non-technical employees. It\u2019s not magic, it\u2019s not even necessarily hard, and it is absolutely vital to the success of your business. If there\u2019s one thing you don\u2019t skimp on in 2021, make it security!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A recent study found over half of public Docker Hub images have critical vulnerabilities related to configuration.<\/p>\n","protected":false},"author":1,"featured_media":1247,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1969,1948,14],"tags":[1169,1943,36,1949,1877,1910,31,2021,2022,1950,2025,2024,17],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Critical Vulnerabilities Found in Public Docker Hub Images - PWV Consultants<\/title>\n<meta name=\"description\" content=\"A recent study found over half of public Docker Hub images have critical vulnerabilities related to configuration. The impact will be costly.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Critical Vulnerabilities Found in Public Docker Hub Images\" \/>\n<meta property=\"og:description\" content=\"A recent study found over half of public Docker Hub images have critical vulnerabilities related to configuration.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-23T18:44:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-23T18:44:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/security-2168234_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1216\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Critical Vulnerabilities Found in Public Docker Hub Images\",\"datePublished\":\"2020-12-23T18:44:56+00:00\",\"dateModified\":\"2020-12-23T18:44:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/\"},\"wordCount\":546,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/security-2168234_1920.jpg\",\"keywords\":[\"Application Security\",\"AppSec\",\"Business\",\"Configuration\",\"critical vulnerability\",\"CyberSec\",\"Cybersecurity\",\"Docker Hub\",\"Images\",\"Misconfiguration\",\"Operation Red Kangaroo\",\"Prevasio\",\"Security\"],\"articleSection\":[\"Business\",\"Configuration\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/\",\"name\":\"Critical Vulnerabilities Found in Public Docker Hub Images - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/security-2168234_1920.jpg\",\"datePublished\":\"2020-12-23T18:44:56+00:00\",\"dateModified\":\"2020-12-23T18:44:58+00:00\",\"description\":\"A recent study found over half of public Docker Hub images have critical vulnerabilities related to configuration. The impact will be costly.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/security-2168234_1920.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/security-2168234_1920.jpg\",\"width\":1920,\"height\":1216,\"caption\":\"Image by Jan Alexander from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Critical Vulnerabilities Found in Public Docker Hub Images\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Critical Vulnerabilities Found in Public Docker Hub Images - PWV Consultants","description":"A recent study found over half of public Docker Hub images have critical vulnerabilities related to configuration. The impact will be costly.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/","og_locale":"en_US","og_type":"article","og_title":"Critical Vulnerabilities Found in Public Docker Hub Images","og_description":"A recent study found over half of public Docker Hub images have critical vulnerabilities related to configuration.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-12-23T18:44:56+00:00","article_modified_time":"2020-12-23T18:44:58+00:00","og_image":[{"width":1920,"height":1216,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/security-2168234_1920.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Critical Vulnerabilities Found in Public Docker Hub Images","datePublished":"2020-12-23T18:44:56+00:00","dateModified":"2020-12-23T18:44:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/"},"wordCount":546,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/security-2168234_1920.jpg","keywords":["Application Security","AppSec","Business","Configuration","critical vulnerability","CyberSec","Cybersecurity","Docker Hub","Images","Misconfiguration","Operation Red Kangaroo","Prevasio","Security"],"articleSection":["Business","Configuration","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/","url":"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/","name":"Critical Vulnerabilities Found in Public Docker Hub Images - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/security-2168234_1920.jpg","datePublished":"2020-12-23T18:44:56+00:00","dateModified":"2020-12-23T18:44:58+00:00","description":"A recent study found over half of public Docker Hub images have critical vulnerabilities related to configuration. The impact will be costly.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/security-2168234_1920.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/security-2168234_1920.jpg","width":1920,"height":1216,"caption":"Image by Jan Alexander from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/critical-vulnerabilities-found-in-public-docker-hub-images\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Critical Vulnerabilities Found in Public Docker Hub Images"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1239"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1239"}],"version-history":[{"count":3,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1239\/revisions"}],"predecessor-version":[{"id":1248,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1239\/revisions\/1248"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1247"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}