{"id":1671,"date":"2021-03-22T14:53:45","date_gmt":"2021-03-22T18:53:45","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1671"},"modified":"2021-03-22T14:53:47","modified_gmt":"2021-03-22T18:53:47","slug":"f5-networks-big-ip-is-under-attack","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/","title":{"rendered":"F5 Network&#8217;s BIG-IP is Under Attack"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-on-the-heels-of-the-microsoft-exchange-vulnerability-f5-network-also-unveiled-a-flaw-in-their-big-ip-infrastructure-cyber-attacks-on-businesses-yet-to-patch-the-flaw-are-on-the-rise\">On the heels of the Microsoft Exchange vulnerability, F5 network also unveiled a flaw in their BIG-IP infrastructure. Cyber-attacks on businesses yet to patch the flaw are on the rise.<\/h2>\n\n\n\n<p>Earlier this month, F5 Networks announced a vulnerability in its BIG-IP infrastructure. Customers of the Seattle-based company use the BIG-IP servers to manage and monitor traffic, including load balancing, DDoS mitigation and web application security. A patch was released for the vulnerability, but, as is typical of these announcements, cybercriminals are scanning for and exploiting this vulnerability in the wild.<\/p>\n\n\n\n<p>This is fast becoming an urgent matter as F5 provides enterprise services to companies like Facebook, Microsoft, Oracle and Fortune 500 companies including large financial institutions and ISPs. The problem is that this vulnerability was announced and patched right on the heels of the Microsoft Exchange vulnerability and patch release. Many companies were incredibly focused on the first, so when the second announcement arrived in the middle of it all, it got pushed to the side. That\u2019s not to say it wasn\u2019t a priority, it was too much for security teams to handle at once. Unfortunately, now businesses are in a do-or-die situation.<\/p>\n\n\n\n<p>A Twitter post shared by researchers at NCC Group, a security firm, <a href=\"https:\/\/twitter.com\/buffaloverflow\/status\/1372861157317435394\" target=\"_blank\" rel=\"noreferrer noopener\">said<\/a> that they are \u201cseeing full-chain exploitation\u201d of the vulnerability, which allows remote attackers to execute commands on BIG-IP devices without credentials. &#8220;After seeing lots of broken exploits and failed attempts, we are now seeing successful in the wild exploitation of this vulnerability, as of this morning,&#8221; Rich Warren, Principal Security Consultant at NCC Group and co-author of the blog wrote.<\/p>\n\n\n\n<p><a href=\"https:\/\/arstechnica.com\/gadgets\/2021\/03\/to-security-pros-dread-another-critical-server-vulnerability-is-under-exploit\/\" target=\"_blank\" rel=\"noreferrer noopener\">He continued<\/a>, &#8220;The attackers are hitting multiple honeypots in different regions, suggesting that there is no specific targeting. It is more likely that they are &#8216;spraying&#8217; attempts across the internet, in the hope that they can exploit the vulnerability before organizations have a chance to patch it.&#8221;<\/p>\n\n\n\n<p>For a long time, we have said that patching vulnerabilities is a top priority. Security is a priority. Fixing these problems cannot wait because hackers and attackers aren\u2019t going to wait. We\u2019ve indicated that threat actors attack indiscriminately, that the size of your business doesn\u2019t matter, they\u2019ll take whatever they can get. After the Microsoft Exchange vulnerability announcement, there was an immediate attack, and it wasn\u2019t pretty. We\u2019re still working out the ramifications and may never know the full impact, similar to the SolarWinds hack.<\/p>\n\n\n\n<p>The increase in activity around this issue is an indication that this type of activity after a vulnerability announcement isn\u2019t going to go anywhere. There will continue to be a flurry of attempted exploits, some of them sure to be successful, after every vulnerability announcement. Because attackers know that businesses can\u2019t keep up, they know that security was viewed as an afterthought in the past, that businesses don\u2019t have the resources they need to stay on top of every piece of technology they employ.<\/p>\n\n\n\n<p>Now is not the time to wait. Cyberattacks are not going anywhere, especially as we continue to work remotely and attend virtual events. Now is the time to ensure your business\u2019 security is top-notch, that your &#8220;i&#8221;s are dotted and your &#8220;t&#8221;s are crossed. No business is exempt from these attacks, if you have a web presence with data stored, you\u2019re a potential target. If your team can\u2019t keep up, it\u2019s okay to bring in an expert to consult and help streamline processes. It\u2019s recommended to hire an expert to review your security in general, mostly because an outside set of eyes is more likely to see things your internal team would miss. This is a vital piece of your business\u2019 survival. Make sure you get it right!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>F5 Network announced a flaw and released a patch in its BIG-IP infrastructure. Attackers are now exploiting unpatched systems in the wild.<\/p>\n","protected":false},"author":1,"featured_media":1676,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[5,2073],"tags":[2208,36,1910,31,2207,2209,1992,17,1997],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>F5 Network&#039;s BIG-IP is Under Attack - PWV Consultants<\/title>\n<meta name=\"description\" content=\"F5 Network announced a flaw and released a patch in its BIG-IP infrastructure. Attackers are now exploiting unpatched systems in the wild.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"F5 Network&#039;s BIG-IP is Under Attack\" \/>\n<meta property=\"og:description\" content=\"F5 Network announced a flaw and released a patch in its BIG-IP infrastructure. Attackers are now exploiting unpatched systems in the wild.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-22T18:53:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-22T18:53:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/F5-Network-BIG-IP-Under-Attack-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"F5 Network&#8217;s BIG-IP is Under Attack\",\"datePublished\":\"2021-03-22T18:53:45+00:00\",\"dateModified\":\"2021-03-22T18:53:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/\"},\"wordCount\":632,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/F5-Network-BIG-IP-Under-Attack-scaled.jpeg\",\"keywords\":[\"BIG-IP\",\"Business\",\"CyberSec\",\"Cybersecurity\",\"F5 Network\",\"Microsoft Exchange\",\"patching\",\"Security\",\"vulnerability\"],\"articleSection\":[\"Cyber Security\",\"Vulnerability\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/\",\"name\":\"F5 Network's BIG-IP is Under Attack - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/F5-Network-BIG-IP-Under-Attack-scaled.jpeg\",\"datePublished\":\"2021-03-22T18:53:45+00:00\",\"dateModified\":\"2021-03-22T18:53:47+00:00\",\"description\":\"F5 Network announced a flaw and released a patch in its BIG-IP infrastructure. Attackers are now exploiting unpatched systems in the wild.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/F5-Network-BIG-IP-Under-Attack-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/F5-Network-BIG-IP-Under-Attack-scaled.jpeg\",\"width\":2560,\"height\":1707,\"caption\":\"young criminal male hides his face under the hood and mask, hacks the password on the laptop, typing something. anonymous, incognito guy going to hack. cyberattack concept\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"F5 Network&#8217;s BIG-IP is Under Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"F5 Network's BIG-IP is Under Attack - PWV Consultants","description":"F5 Network announced a flaw and released a patch in its BIG-IP infrastructure. Attackers are now exploiting unpatched systems in the wild.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/","og_locale":"en_US","og_type":"article","og_title":"F5 Network's BIG-IP is Under Attack","og_description":"F5 Network announced a flaw and released a patch in its BIG-IP infrastructure. Attackers are now exploiting unpatched systems in the wild.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-03-22T18:53:45+00:00","article_modified_time":"2021-03-22T18:53:47+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/F5-Network-BIG-IP-Under-Attack-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"F5 Network&#8217;s BIG-IP is Under Attack","datePublished":"2021-03-22T18:53:45+00:00","dateModified":"2021-03-22T18:53:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/"},"wordCount":632,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/F5-Network-BIG-IP-Under-Attack-scaled.jpeg","keywords":["BIG-IP","Business","CyberSec","Cybersecurity","F5 Network","Microsoft Exchange","patching","Security","vulnerability"],"articleSection":["Cyber Security","Vulnerability"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/","url":"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/","name":"F5 Network's BIG-IP is Under Attack - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/F5-Network-BIG-IP-Under-Attack-scaled.jpeg","datePublished":"2021-03-22T18:53:45+00:00","dateModified":"2021-03-22T18:53:47+00:00","description":"F5 Network announced a flaw and released a patch in its BIG-IP infrastructure. Attackers are now exploiting unpatched systems in the wild.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/F5-Network-BIG-IP-Under-Attack-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/F5-Network-BIG-IP-Under-Attack-scaled.jpeg","width":2560,"height":1707,"caption":"young criminal male hides his face under the hood and mask, hacks the password on the laptop, typing something. anonymous, incognito guy going to hack. cyberattack concept"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/f5-networks-big-ip-is-under-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"F5 Network&#8217;s BIG-IP is Under Attack"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1671"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1671"}],"version-history":[{"count":3,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1671\/revisions"}],"predecessor-version":[{"id":1677,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1671\/revisions\/1677"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1676"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1671"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1671"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1671"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}