{"id":1923,"date":"2021-05-19T18:50:25","date_gmt":"2021-05-19T22:50:25","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1923"},"modified":"2021-05-19T18:50:26","modified_gmt":"2021-05-19T22:50:26","slug":"new-wifi-vulnerabilities-have-always-existed","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/","title":{"rendered":"New WiFi Vulnerabilities Have Always Existed"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-wifi-enabled-devices-pose-an-inherent-risk-to-businesses-especially-iot-devices-newly-discovered-vulnerabilities-have-been-baked-into-wifi-enabled-devices-since-the-beginning\">WiFi enabled devices pose an inherent risk to businesses, especially IoT devices. Newly discovered vulnerabilities have been baked into WiFi enabled devices since the beginning.<\/h2>\n\n\n\n<p>Technology is an ever-evolving, ever-advancing industry. And there is one key piece of technology that enables us to use the majority of other technology in use today, regardless of industry or sector: The internet. Specifically, WiFi. WiFi enabled devices carry a risk, though, and we\u2019ve recently learned of a number of vulnerabilities related to WiFi protocols, including WPA2.<\/p>\n\n\n\n<p>Belgian cybersecurity expert Mathy Vanhoef, who co-discovered the KRACK attack in 2017, discovered a collection of vulnerabilities impacting a range of WiFi devices across a variety of&nbsp; manufacturers. These \u201cfragmentation and aggregation attacks,\u201d of which there are 12, were named FragAttacks and have the potential to leak user information. They can also be used to attack devices. From <a href=\"https:\/\/www.fragattacks.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Vanhoef\u2019s website<\/a> dedicated to his research:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\"><p>\u201cAn adversary that is within range of a victim&#8217;s Wi-Fi network can abuse these vulnerabilities to steal user information or attack devices. Three of the discovered vulnerabilities are design flaws in the Wi-Fi standard and therefore affect most devices. On top of this, several other vulnerabilities were discovered that are caused by widespread programming mistakes in Wi-Fi products. Experiments indicate that every Wi-Fi product is affected by at least one vulnerability and that most products are affected by several vulnerabilities.<\/p><p>The discovered vulnerabilities affect all modern security protocols of Wi-Fi, including the latest WPA3 specification. Even the original security protocol of Wi-Fi, called WEP, is affected. This means that several of the newly discovered design flaws have been part of Wi-Fi since its release in 1997! Fortunately, the design flaws are hard to abuse because doing so requires user interaction or is only possible when using uncommon network settings. As a result, in practice the biggest concern are the programming mistakes in Wi-Fi products since several of them are trivial to exploit.\u201d<\/p><\/blockquote>\n\n\n\n<p>If any of that is confusing to you, let us clear it up: Any device that is WiFi enabled using any WiFi security protocol ever created needs to be updated. Cell phones, computers, tablets, IoT devices like smart appliances and home networking devices, routers, printers, smart TVs, anything that connects to the internet potentially has a vulnerability. These vulnerabilities can be used to steal sensitive information, to plant malware on devices for later harvesting and a variety of other nasty ways.<\/p>\n\n\n\n<p>But there is good news. First, it doesn\u2019t appear that these vulnerabilities have been exploited in the wild yet. Vanhoef coordinated discussing these vulnerabilities with manufacturers, which are already releasing patches, prior to disclosing FragAttacks to the public. On the website (linked above) you can also find the technical details relating to these vulnerabilities. The other good news is that these flaws appear hard to probe, requiring user interaction or an obscure network setting. There are some which are trivial to execute, though, which is why it\u2019s important to update any WiFi enabled device as soon as possible.<\/p>\n\n\n\n<p>According to <a href=\"https:\/\/gizmodo.com\/update-windows-and-lots-of-other-stuff-asap-fragatta-1846878065\" target=\"_blank\" rel=\"noreferrer noopener\">Gizmodo<\/a>, Microsoft already issued several updates and applied patches to Windows 10, Windows 8.1 and Windows 7. Netgear has also pushed out some patches and has more on the way. <a href=\"https:\/\/www.theverge.com\/2021\/5\/12\/22433134\/fragattacks-wi-fi-vulnerabilities-update-security\" target=\"_blank\" rel=\"noreferrer noopener\">The Verge<\/a> has a list of manufacturers with patches, so be sure to check that out as well.<\/p>\n\n\n\n<p>It is incredibly important, incredibly important, for business owners, business leaders and security teams to take a hard look at this. Businesses use WiFi enabled devices, <a href=\"https:\/\/www.pwvconsultants.com\/blog\/businesses-and-iot-devices-what-you-need-to-know\/\" target=\"_blank\" rel=\"noreferrer noopener\">including IoT devices<\/a>. Even if you\u2019re not using the device via WiFi, that vulnerability is still there and can still be exploited. Make sure you update all machines, even those not currently in use, and apply any patches that are issued. This problem is now known by threat actors, and, as with most research discoveries, it will be exploited. Threat actors know that businesses won\u2019t do their updates or apply their patches in a timely fashion, if at all. They\u2019ll use any edge they can gain to reach their ultimate goal, which is to steal as much information as possible.<\/p>\n\n\n\n<p>Don\u2019t put this off, there are enough unknowns out there that businesses will have to handle. This is a known problem, something preventable. Don\u2019t be the business that succumbs to a problem that could have been avoided.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>WiFi enabled devices are a security risk. Newly discovered vulnerabilities have been baked into WiFi protocols since the beginning.<\/p>\n","protected":false},"author":1,"featured_media":1946,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1969,14,2073,2284],"tags":[36,31,2044,1962,1992,17,487,1997,2311],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New WiFi Vulnerabilities Have Always Existed - PWV Consultants<\/title>\n<meta name=\"description\" content=\"WiFi enabled devices are a security risk. Newly discovered vulnerabilities have been baked into WiFi protocols since the beginning.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New WiFi Vulnerabilities Have Always Existed\" \/>\n<meta property=\"og:description\" content=\"WiFi enabled devices are a security risk. Newly discovered vulnerabilities have been baked into WiFi protocols since the beginning.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-19T22:50:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-19T22:50:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/WiFi-Vulnerabilities-Existed-Beginning-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"996\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"New WiFi Vulnerabilities Have Always Existed\",\"datePublished\":\"2021-05-19T22:50:25+00:00\",\"dateModified\":\"2021-05-19T22:50:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/\"},\"wordCount\":721,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/WiFi-Vulnerabilities-Existed-Beginning-scaled.jpeg\",\"keywords\":[\"Business\",\"Cybersecurity\",\"IoT\",\"IoT devices\",\"patching\",\"Security\",\"update\",\"vulnerability\",\"WiFi\"],\"articleSection\":[\"Business\",\"Security\",\"Vulnerability\",\"Wireless\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/\",\"name\":\"New WiFi Vulnerabilities Have Always Existed - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/WiFi-Vulnerabilities-Existed-Beginning-scaled.jpeg\",\"datePublished\":\"2021-05-19T22:50:25+00:00\",\"dateModified\":\"2021-05-19T22:50:26+00:00\",\"description\":\"WiFi enabled devices are a security risk. Newly discovered vulnerabilities have been baked into WiFi protocols since the beginning.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/WiFi-Vulnerabilities-Existed-Beginning-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/WiFi-Vulnerabilities-Existed-Beginning-scaled.jpeg\",\"width\":2560,\"height\":996},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New WiFi Vulnerabilities Have Always Existed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"New WiFi Vulnerabilities Have Always Existed - PWV Consultants","description":"WiFi enabled devices are a security risk. Newly discovered vulnerabilities have been baked into WiFi protocols since the beginning.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/","og_locale":"en_US","og_type":"article","og_title":"New WiFi Vulnerabilities Have Always Existed","og_description":"WiFi enabled devices are a security risk. Newly discovered vulnerabilities have been baked into WiFi protocols since the beginning.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-05-19T22:50:25+00:00","article_modified_time":"2021-05-19T22:50:26+00:00","og_image":[{"width":2560,"height":996,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/WiFi-Vulnerabilities-Existed-Beginning-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"New WiFi Vulnerabilities Have Always Existed","datePublished":"2021-05-19T22:50:25+00:00","dateModified":"2021-05-19T22:50:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/"},"wordCount":721,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/WiFi-Vulnerabilities-Existed-Beginning-scaled.jpeg","keywords":["Business","Cybersecurity","IoT","IoT devices","patching","Security","update","vulnerability","WiFi"],"articleSection":["Business","Security","Vulnerability","Wireless"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/","url":"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/","name":"New WiFi Vulnerabilities Have Always Existed - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/WiFi-Vulnerabilities-Existed-Beginning-scaled.jpeg","datePublished":"2021-05-19T22:50:25+00:00","dateModified":"2021-05-19T22:50:26+00:00","description":"WiFi enabled devices are a security risk. Newly discovered vulnerabilities have been baked into WiFi protocols since the beginning.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/WiFi-Vulnerabilities-Existed-Beginning-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/WiFi-Vulnerabilities-Existed-Beginning-scaled.jpeg","width":2560,"height":996},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/new-wifi-vulnerabilities-have-always-existed\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"New WiFi Vulnerabilities Have Always Existed"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1923"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1923"}],"version-history":[{"count":6,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1923\/revisions"}],"predecessor-version":[{"id":1949,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1923\/revisions\/1949"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1946"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}