{"id":1288,"date":"2021-01-14T14:39:46","date_gmt":"2021-01-14T19:39:46","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1288"},"modified":"2021-01-14T14:39:47","modified_gmt":"2021-01-14T19:39:47","slug":"sensationalism-of-security-leads-to-security-problems","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/","title":{"rendered":"Sensationalism of Security Leads to Security Problems"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-with-security-at-the-forefront-of-everyone-s-minds-you-should-exercise-caution-when-reading-about-new-problems-headlines-can-be-deceiving-always-read-the-article\">With security at the forefront of everyone\u2019s minds, you should exercise caution when reading about new problems. Headlines can be deceiving, always read the article.<\/h2>\n\n\n\n<p>Recently, an article was written about a potential security problem with a specific piece of hardware. The headline was enticing and also gut wrenching if true. Upon reading the article, it was discovered that while there was a security problem, it was not the magnitude the headline illustrated. In fact, the problem would still take a bad actor physical access, years of knowledge and a lot of money to crack. As tech experts, we can read those articles and understand how big an issue really is. But many who are not tech or security experts would likely read the headline and fear the problem based on the headline alone, driving them to choose a different, possibly inferior, security method. Which got us thinking, what is the purpose of the sensationalism of security?<\/p>\n\n\n\n<p>Every business leader knows that security needs more attention. If they didn\u2019t know that before the pandemic, they certainly do now. Security must be monitored and updated and patched. It must be written into the code of all features and products offered to customers, because if it isn\u2019t, then that business is on the hook for any information that is stolen. More and more businesses are seeing the repercussions faced by <a href=\"https:\/\/www.pwvconsultants.com\/blog\/what-corporations-should-learn-from-capital-one\/\" target=\"_blank\" rel=\"noreferrer noopener\">Capital One<\/a>, Boeing, <a href=\"https:\/\/www.pwvconsultants.com\/blog\/twitter-hacker-a-17-year-old-amateur\/\" target=\"_blank\" rel=\"noreferrer noopener\">Twitter<\/a> and others for not being compliant or for fraudulent reporting. No business wants to be in the news for this reason!<\/p>\n\n\n\n<p>The problem is, because higher ups are starting to pay attention (at least a little, we hope), journalists and media outlets will try to bait people in with bloated headlines. It happens in every industry for various reasons. Entertainment, sports, finance, etc. Whatever the hot-button topic is in that moment, they are doing everything they can to get those clicks. The more clicks they have, the more ad revenue they generate. Right now, the hot-button topics in technology are security, digital transformation, AI and ML. Only one of those has real dramatic gravitas.<\/p>\n\n\n\n<p>For example, if you read a headline that said, \u201cOpen-Source Code Contains Malware,\u201d it\u2019s likely you\u2019d tell your developers to stop using it. But if you opened the article, you would learn that really all that needs to happen is a thorough review of all code taken from open-source platforms. Not all code is infected with malware strings, and there is a specific place you can look to find the current known problem areas. From there you can determine if you use that code. We advocate for reviewing open-source code regardless because it\u2019s something developers regularly use to do their jobs.&nbsp;But a vast majority of open source code does not contain malware.<\/p>\n\n\n\n<p>Security is, by definition, an attempt to stop something that may be inevitable and always has. But that doesn&#8217;t mean we should dramatize that fact. This is a true statement: &#8220;Every password can be cracked.&#8221; However, for many <a rel=\"noreferrer noopener\" href=\"https:\/\/www.pwvconsultants.com\/blog\/password-managers-keep-your-information-secure\/\" target=\"_blank\">passwords<\/a>, especially one <a href=\"https:\/\/www.pwvconsultants.com\/blog\/strong-passwords-and-2fa-are-vital-to-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">longer than 24 characters<\/a>, it would take eons [the planet may not be here, let alone your Spotify account] to do. Think about it, there is no lock on this planet that cannot be broken with the right amount of time and resources. Locks on safes and locks on security doors like the ones they have in the oval office are all ranked. They are ranked by the amount of time it takes to break that lock. You can read about the rankings for both mechanical and electric locks <a rel=\"noreferrer noopener\" href=\"https:\/\/lockreference.com\/ratings-for-safe-locks\/\" target=\"_blank\">here<\/a>. But this just proves that every lock can be broken given the right amount of time. And that is okay. Nothing is foolproof, that is the deep irony of the Titanic. <\/p>\n\n\n\n<p>This is why it is important that your <a href=\"https:\/\/www.pwvconsultants.com\/blog\/cloudflare-vulnerability-reveals-need-for-depth\/\" target=\"_blank\" rel=\"noreferrer noopener\">security have layers and depth<\/a>, why we say to <a href=\"https:\/\/www.pwvconsultants.com\/blog\/why-hiring-an-expert-is-crucial-to-success\/\" target=\"_blank\" rel=\"noreferrer noopener\">hire or consult an expert <\/a>anytime you\u2019re doing something with security. When a business leader reads a headline designed to make you click on it, but doesn\u2019t actually read the article, it can lead to poor decision-making because not all of the answers are there.<\/p>\n\n\n\n<p>Media outlets are just like every other business in that they are in business to make money. Yes, they want to report the news and keep people informed of what\u2019s happening in the world, but their primary goal is to make money. The best way to do that is to sensationalize current trends so that links are clicked and revenue is generated.&nbsp;<\/p>\n\n\n\n<p>Don\u2019t fall for the sensationalism of security! Understand that nothing, not one single thing that needs security on this planet from physical homes to personal data, can ever be 100% fully protected. Data security requires depth, layers, different tools designed to catch different attacks. No one tool can do it all, and as long as you have the proper protocols in place, if something fails then another system should pick up the slack. Yes, it\u2019s complicated, so bring in an expert to help you understand how it all works, show you how to keep it going and educate your team on potential issues that could happen.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Media outlets strive to get clicks on articles for ad revenue. Don&#8217;t fall for the sensationalism of security the media portrays.<\/p>\n","protected":false},"author":1,"featured_media":1314,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[4,14],"tags":[36,1569,1959,575,2065,2064,17,2063],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Sensationalism of Security Leads to Security Problems - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Media outlets strive to get clicks on articles for ad revenue. Don&#039;t fall for the sensationalism of security the media portrays.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sensationalism of Security Leads to Security Problems\" \/>\n<meta property=\"og:description\" content=\"Media outlets strive to get clicks on articles for ad revenue. Don&#039;t fall for the sensationalism of security the media portrays.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-14T19:39:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-14T19:39:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Sensationalism-Clickbait-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Sensationalism of Security Leads to Security Problems\",\"datePublished\":\"2021-01-14T19:39:46+00:00\",\"dateModified\":\"2021-01-14T19:39:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/\"},\"wordCount\":869,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Sensationalism-Clickbait-scaled.jpeg\",\"keywords\":[\"Business\",\"code\",\"expert\",\"Information Security\",\"lock\",\"Media\",\"Security\",\"Sensationalism\"],\"articleSection\":[\"Information Security\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/\",\"name\":\"Sensationalism of Security Leads to Security Problems - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Sensationalism-Clickbait-scaled.jpeg\",\"datePublished\":\"2021-01-14T19:39:46+00:00\",\"dateModified\":\"2021-01-14T19:39:47+00:00\",\"description\":\"Media outlets strive to get clicks on articles for ad revenue. Don't fall for the sensationalism of security the media portrays.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Sensationalism-Clickbait-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Sensationalism-Clickbait-scaled.jpeg\",\"width\":2560,\"height\":1280,\"caption\":\"Clickbait as a Cheap Marketing Trick to Get A Click\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sensationalism of Security Leads to Security Problems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Sensationalism of Security Leads to Security Problems - PWV Consultants","description":"Media outlets strive to get clicks on articles for ad revenue. Don't fall for the sensationalism of security the media portrays.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/","og_locale":"en_US","og_type":"article","og_title":"Sensationalism of Security Leads to Security Problems","og_description":"Media outlets strive to get clicks on articles for ad revenue. Don't fall for the sensationalism of security the media portrays.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-01-14T19:39:46+00:00","article_modified_time":"2021-01-14T19:39:47+00:00","og_image":[{"width":2560,"height":1280,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Sensationalism-Clickbait-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Sensationalism of Security Leads to Security Problems","datePublished":"2021-01-14T19:39:46+00:00","dateModified":"2021-01-14T19:39:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/"},"wordCount":869,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Sensationalism-Clickbait-scaled.jpeg","keywords":["Business","code","expert","Information Security","lock","Media","Security","Sensationalism"],"articleSection":["Information Security","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/","url":"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/","name":"Sensationalism of Security Leads to Security Problems - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Sensationalism-Clickbait-scaled.jpeg","datePublished":"2021-01-14T19:39:46+00:00","dateModified":"2021-01-14T19:39:47+00:00","description":"Media outlets strive to get clicks on articles for ad revenue. Don't fall for the sensationalism of security the media portrays.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Sensationalism-Clickbait-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Sensationalism-Clickbait-scaled.jpeg","width":2560,"height":1280,"caption":"Clickbait as a Cheap Marketing Trick to Get A Click"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/sensationalism-of-security-leads-to-security-problems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Sensationalism of Security Leads to Security Problems"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1288"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1288"}],"version-history":[{"count":8,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1288\/revisions"}],"predecessor-version":[{"id":1318,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1288\/revisions\/1318"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1314"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}