{"id":1319,"date":"2021-01-19T13:00:00","date_gmt":"2021-01-19T18:00:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1319"},"modified":"2021-01-18T20:02:24","modified_gmt":"2021-01-19T01:02:24","slug":"security-lags-in-digital-transformation","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/","title":{"rendered":"Security Lags in Digital Transformation"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-digital-transformation-has-become-a-pressing-issue-for-businesses-worldwide-spurred-in-part-by-the-covid-19-pandemic-but-as-businesses-go-digital-security-is-not-keeping-up\">Digital transformation has become a pressing issue for businesses worldwide, spurred in part by the COVID-19 pandemic. But as businesses go digital, security is not keeping up.<\/h2>\n\n\n\n<p>The COVID-19 pandemic forced businesses to take a hard look at technology. <a href=\"https:\/\/www.pwvconsultants.com\/blog\/digital-transformation-modernizes-your-business\/\" target=\"_blank\" rel=\"noreferrer noopener\">Digital transformation<\/a> was already starting in some businesses, others were in the planning stage and still other businesses were only beginning to discover the trend. Then COVID hit and the entire world was sent home to work. Businesses struggled to ensure their employees not only had the equipment they needed to do their jobs, but also to ensure the security of so many remote connections. As cyberattacks ramped up in 2020, businesses who had speedily gone through a digital transformation realized that the security of their organization was sorely lacking.<\/p>\n\n\n\n<p>Digital transformation typically involves cloud migration. But before you can migrate your business to the cloud, you have to modernize. And you don\u2019t just have to modernize your systems and processes and applications, but you have to modernize your security. Legacy items generally do not fit into the cloud, and that also applies to traditional security methods. The cloud is designed to be secure by default, and the way it is secure is not compatible with traditional methods.<\/p>\n\n\n\n<p>According to a survey conducted by Check Point Software Technologies in July, over 80% of the 650 cybersecurity and IT professionals said that their traditional security methods either didn\u2019t work or had limited functionality in the cloud. <a href=\"https:\/\/www.technewsworld.com\/story\/Cloud-Security-Practices-Playing-Into-Hands-of-Attackers-86964.html\" target=\"_blank\" rel=\"noreferrer noopener\">Tech News World<\/a> shares, \u201cThis indicates that organizations&#8217; cloud migrations and deployments are racing ahead of their security teams&#8217; abilities to defend against attacks and breaches, according to TJ Gonen, head of the company&#8217;s cloud product line.<\/p>\n\n\n\n<p>&#8220;Their existing security solutions only provide limited protections against cloud threats, and teams often lack the expertise needed to improve security and compliance processes,&#8221; said Gonen.\u201d<\/p>\n\n\n\n<p>This information points to a number of things we have discussed. Modernization must come before cloud migration. Security, whether digital or analogue, requires layers to be effective. Hire an expert to assist with all complex technological projects\/solutions.<\/p>\n\n\n\n<p>There is no real reason that security of your business should lag behind digital transformation. Security should be built into everything as you go. This is a classic example of businesses trying to rush the process because they think they need to go fast, and business leaders saying, \u201cOh, security can wait.\u201d No. It. Can\u2019t. And if the increasing number of configuration problems, vulnerabilities discovered, attacks on businesses and new types of malware showing up hasn\u2019t gotten your attention, especially over the last year, then you are not paying attention.<\/p>\n\n\n\n<p>Security and digital transformation are both hot-button topics right now. Businesses are all about digitizing to make employee\u2019s lives and jobs easier while working remotely, but they have also started to really pay attention to security. At least, some have. Others will catch up, but only time will tell if it is too late for their business or not.<\/p>\n\n\n\n<p>Because those are hot-button topics, it is vital, crucial, IMPERATIVE that you <a href=\"https:\/\/www.pwvconsultants.com\/blog\/why-hiring-an-expert-is-crucial-to-success\/\" target=\"_blank\" rel=\"noreferrer noopener\">bring in an expert<\/a>. Not only is an expert well-versed in the arena, but they know the best way to manage the project for max efficiency and completion. An expert gives you an outside set of eyes which may catch something your internal team did not see simply because they look at it all the time. This expert isn\u2019t taking the place of your staff, this person is simply giving you the best way to complete a task. And then they can show you how to maintain everything and teach your team how it works and how to troubleshoot problems.<\/p>\n\n\n\n<p>This one-time expense is far less costly than what a security breach will cost you. On top of that, you will have peace of mind knowing that your business is running smoothly, is secure and that there are effective processes in place. It\u2019s also prudent to point out that if you begin the process of digital transformation without consulting an expert and something goes wrong, now you have the expense of fixing what went wrong, the project is delayed and it\u2019s more expensive than it would have been to just hire an expert in the first place.<\/p>\n\n\n\n<p>Don\u2019t assume that your traditional security methods and protocols are going to work in the cloud, it\u2019s unlikely that they will. Don\u2019t assume that your systems and processes can laterally move to the cloud without being adapted. That\u2019s not how it works. Everything has to be modernized, anything that can be automated should be automated, and then you can migrate. There\u2019s an <a href=\"https:\/\/www.pwvconsultants.com\/blog\/order-of-operations-modernize-automate-migrate\/\" target=\"_blank\" rel=\"noreferrer noopener\">order to operations<\/a>, and if not done properly, the project often will fail. Make sure your business doesn\u2019t get caught in limbo, bring in fresh eyes to help!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Businesses sped toward digital transformation in the wake of COVID-19. Security, unfortunately, did not keep up.<\/p>\n","protected":false},"author":1,"featured_media":1333,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1969,1958,958,14],"tags":[36,18,531,31,1944,1959,575,19,557,17],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Lags in Digital Transformation - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Businesses sped toward digital transformation in the wake of COVID-19. Security, unfortunately, did not keep up.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Lags in Digital Transformation\" \/>\n<meta property=\"og:description\" content=\"Businesses sped toward digital transformation in the wake of COVID-19. Security, unfortunately, did not keep up.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-19T18:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-19T01:02:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Digital-Transformation-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Security Lags in Digital Transformation\",\"datePublished\":\"2021-01-19T18:00:00+00:00\",\"dateModified\":\"2021-01-19T01:02:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/\"},\"wordCount\":809,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Digital-Transformation-scaled.jpeg\",\"keywords\":[\"Business\",\"Cloud\",\"Cloud migration\",\"Cybersecurity\",\"Digital Transformation\",\"expert\",\"Information Security\",\"Modernization\",\"remote work\",\"Security\"],\"articleSection\":[\"Business\",\"Digital Transformation\",\"Information Technology\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/\",\"name\":\"Security Lags in Digital Transformation - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Digital-Transformation-scaled.jpeg\",\"datePublished\":\"2021-01-19T18:00:00+00:00\",\"dateModified\":\"2021-01-19T01:02:24+00:00\",\"description\":\"Businesses sped toward digital transformation in the wake of COVID-19. Security, unfortunately, did not keep up.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Digital-Transformation-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Digital-Transformation-scaled.jpeg\",\"width\":2560,\"height\":1440,\"caption\":\"Digital transformation, disruption, innovation. Business and modern technology concept.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Lags in Digital Transformation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Lags in Digital Transformation - PWV Consultants","description":"Businesses sped toward digital transformation in the wake of COVID-19. Security, unfortunately, did not keep up.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/","og_locale":"en_US","og_type":"article","og_title":"Security Lags in Digital Transformation","og_description":"Businesses sped toward digital transformation in the wake of COVID-19. Security, unfortunately, did not keep up.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-01-19T18:00:00+00:00","article_modified_time":"2021-01-19T01:02:24+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Digital-Transformation-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Security Lags in Digital Transformation","datePublished":"2021-01-19T18:00:00+00:00","dateModified":"2021-01-19T01:02:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/"},"wordCount":809,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Digital-Transformation-scaled.jpeg","keywords":["Business","Cloud","Cloud migration","Cybersecurity","Digital Transformation","expert","Information Security","Modernization","remote work","Security"],"articleSection":["Business","Digital Transformation","Information Technology","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/","url":"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/","name":"Security Lags in Digital Transformation - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Digital-Transformation-scaled.jpeg","datePublished":"2021-01-19T18:00:00+00:00","dateModified":"2021-01-19T01:02:24+00:00","description":"Businesses sped toward digital transformation in the wake of COVID-19. Security, unfortunately, did not keep up.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Digital-Transformation-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Digital-Transformation-scaled.jpeg","width":2560,"height":1440,"caption":"Digital transformation, disruption, innovation. Business and modern technology concept."},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/security-lags-in-digital-transformation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security Lags in Digital Transformation"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1319"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1319"}],"version-history":[{"count":6,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1319\/revisions"}],"predecessor-version":[{"id":1338,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1319\/revisions\/1338"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1333"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}