{"id":1384,"date":"2021-01-28T13:35:48","date_gmt":"2021-01-28T18:35:48","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1384"},"modified":"2021-01-28T13:35:50","modified_gmt":"2021-01-28T18:35:50","slug":"legacy-vulnerabilities-are-still-a-problem","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/","title":{"rendered":"Legacy Vulnerabilities Are Still a Problem"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-known-vulnerabilities-often-go-unfixed-for-a-variety-of-reasons-unfortunately-these-legacy-vulnerabilities-are-still-in-use-by-threat-actors-causing-problems-for-businesses-worldwide\">Known vulnerabilities often go unfixed for a variety of reasons. Unfortunately, these legacy vulnerabilities are still in use by threat actors, causing problems for businesses worldwide.<\/h2>\n\n\n\n<p>Almost every business worldwide feels the impact that COVID-19 has had on the global economy. There are a few which have benefited from the pandemic and some which have remained stable, but even those have felt the impact in some way. Work from home. Social distancing. Wearing a mask. Telehealth, virtual school, no fans at sporting events, no Broadway shows or concerts, no alcohol after 10pm. Cyberattacks and physical crimes on the rise. Every industry has felt it. Every business has done the best it can to keep afloat and keep pace with technology, but not securing legacy vulnerabilities hurt a lot of businesses.<\/p>\n\n\n\n<p>VPNs have had known issues that went un-fixed, probably because many businesses didn\u2019t use them much. But now they are using them daily and those vulnerabilities still aren\u2019t fixed. With open vulnerabilities in a VPN, a threat actor has a much easier time infiltrating your business systems. These are legacy vulnerabilities, meaning they\u2019ve been around much like the legacy systems businesses still use today. That\u2019s not a bad thing, as long as those legacy items are secured.<\/p>\n\n\n\n<p>Previously, we discussed the three most prominent vulnerabilities in VPNs in <a href=\"https:\/\/www.pwvconsultants.com\/blog\/ransomware-targets-vpns-in-healthcare-industry\/\" target=\"_blank\" rel=\"noreferrer noopener\">an article on healthcare<\/a>. But those VPNs are utilized by other companies as well. The three CVEs in reference are: 1. CVE-2018-13379: Fortinet FortiOS SSL VPN Web Portal Information Disclosure, 2. CVE-2019-11510: Arbitrary File Disclosure in Pulse Connect Secure, 3. CVE-2019-19781: Citrix Application Delivery Controller (ADC) and Gateway. <\/p>\n\n\n\n<p>Again, as stated in the previous article, these are very clearly known vulnerabilities. If you visit the <a rel=\"noreferrer noopener\" href=\"https:\/\/owasp.org\/www-project-top-ten\/\" target=\"_blank\">Open Web Application Security Project (OWASP) website<\/a>, you can find a list of the top 10 web application security risks. On it you will find that the list includes injection flaws, access control issues, misconfigurations, utilization of components with known vulnerabilities and more. The top 10 changes once in awhile, a little bit, but it mostly continues to include known problems that hackers and threat actors continue to exploit today.<\/p>\n\n\n\n<p>There has been so much focus around digital transformation, providing resources to employees who are suddenly working from home and potentially pulling triple duty as a parent and teacher in virtual school locations, adding new features to products in a socially distant and digital environment. That focus has taken away from securing these items, despite an exponential uptick in cybersecurity attacks. New vulnerabilities and misconfigurations are discovered on a regular basis as well, so now businesses are chasing their tails trying to secure the very things they have used to keep their business running during the pandemic.<\/p>\n\n\n\n<p>We sometimes sound like a broken record, always talking about how security can\u2019t be put off, you can\u2019t rush through a new project or application deployment without knowing it\u2019s secure. Here\u2019s what happens when you rush through a project without verifying security, Varonis has released <a href=\"https:\/\/www.varonis.com\/blog\/cybersecurity-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener\">134 Cyberstatistics and Trends for 2021<\/a>, and per Cybint, 95% of cybersecurity breaches are caused by human error. That\u2019s what happens when you rush, or when you put off security and only give a coder a short deadline to get it done and they need more time but can\u2019t get it. This is also what happens when teams rush through an onboarding process and give internal cloud systems access to the janitor. There are some other pretty daunting statistics in that article, like 68% of business leaders feel their cybersecurity risks are increasing, only 5% of companies\u2019 folders are properly protected, data breaches exposed 36 BILLION records in the first half of 2020\u2026 that\u2019s only 6 months and attacks skyrocketed at the end of the year.&nbsp;<\/p>\n\n\n\n<p>The average cost of a data breach is $3.86 million as of 2020. That\u2019s average cost, which is not dependent on business size. That number alone shows why small and medium sized businesses absolutely cannot skimp on security. That kind of a price tag will surely shut their doors for good.<\/p>\n\n\n\n<p>A final, staggering set of statistics for 2020 are as follows: The average time to identify a breach in 2020 was 207 days and the average lifecycle of a breach was 280 days from identification to containment. That means that a breach\u2019s lifecycle lasted \u00be of the year. How much damage can be done in that amount of time? The short answer is, a lot. The longer answer is, we still don\u2019t know.<\/p>\n\n\n\n<p>These numbers, these statistics, are a demonstration of what ostrich syndrome reaps. Security cannot wait. Security cannot be pushed aside or left alone or done once and never revisited. It\u2019s a constant, ongoing process to protect the information in your business. Hire an expert to help put everything how it needs to be. Don\u2019t be the next victim, the next business to shut its doors because a threat actor decided you were an easy target. Fortify your security now, starting with those legacy vulnerabilities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Legacy vulnerabilities present problems for businesses. As long as they remain un-fixed, hackers will continue to exploit them.<\/p>\n","protected":false},"author":1,"featured_media":1389,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1969,12,14],"tags":[36,1910,31,2086,532,2085,2087,1992,17],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Legacy Vulnerabilities Are Still a Problem - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Legacy vulnerabilities present problems for businesses. As long as they remain un-fixed, hackers will continue to exploit them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Legacy Vulnerabilities Are Still a Problem\" \/>\n<meta property=\"og:description\" content=\"Legacy vulnerabilities present problems for businesses. As long as they remain un-fixed, hackers will continue to exploit them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-28T18:35:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-28T18:35:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Legacy-Vulnerabilities-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Legacy Vulnerabilities Are Still a Problem\",\"datePublished\":\"2021-01-28T18:35:48+00:00\",\"dateModified\":\"2021-01-28T18:35:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/\"},\"wordCount\":835,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Legacy-Vulnerabilities-scaled.jpeg\",\"keywords\":[\"Business\",\"CyberSec\",\"Cybersecurity\",\"known vulnerability\",\"legacy items\",\"Legacy Vulnerability\",\"OWASP\",\"patching\",\"Security\"],\"articleSection\":[\"Business\",\"Modernization\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/\",\"name\":\"Legacy Vulnerabilities Are Still a Problem - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Legacy-Vulnerabilities-scaled.jpeg\",\"datePublished\":\"2021-01-28T18:35:48+00:00\",\"dateModified\":\"2021-01-28T18:35:50+00:00\",\"description\":\"Legacy vulnerabilities present problems for businesses. As long as they remain un-fixed, hackers will continue to exploit them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Legacy-Vulnerabilities-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Legacy-Vulnerabilities-scaled.jpeg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Legacy Vulnerabilities Are Still a Problem\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Legacy Vulnerabilities Are Still a Problem - PWV Consultants","description":"Legacy vulnerabilities present problems for businesses. As long as they remain un-fixed, hackers will continue to exploit them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/","og_locale":"en_US","og_type":"article","og_title":"Legacy Vulnerabilities Are Still a Problem","og_description":"Legacy vulnerabilities present problems for businesses. As long as they remain un-fixed, hackers will continue to exploit them.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-01-28T18:35:48+00:00","article_modified_time":"2021-01-28T18:35:50+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Legacy-Vulnerabilities-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Legacy Vulnerabilities Are Still a Problem","datePublished":"2021-01-28T18:35:48+00:00","dateModified":"2021-01-28T18:35:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/"},"wordCount":835,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Legacy-Vulnerabilities-scaled.jpeg","keywords":["Business","CyberSec","Cybersecurity","known vulnerability","legacy items","Legacy Vulnerability","OWASP","patching","Security"],"articleSection":["Business","Modernization","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/","url":"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/","name":"Legacy Vulnerabilities Are Still a Problem - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Legacy-Vulnerabilities-scaled.jpeg","datePublished":"2021-01-28T18:35:48+00:00","dateModified":"2021-01-28T18:35:50+00:00","description":"Legacy vulnerabilities present problems for businesses. As long as they remain un-fixed, hackers will continue to exploit them.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Legacy-Vulnerabilities-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Legacy-Vulnerabilities-scaled.jpeg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/legacy-vulnerabilities-are-still-a-problem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Legacy Vulnerabilities Are Still a Problem"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1384"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1384"}],"version-history":[{"count":5,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1384\/revisions"}],"predecessor-version":[{"id":1395,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1384\/revisions\/1395"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1389"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}