{"id":1954,"date":"2021-05-24T15:34:04","date_gmt":"2021-05-24T19:34:04","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1954"},"modified":"2021-05-24T15:34:06","modified_gmt":"2021-05-24T19:34:06","slug":"phishing-schemes-passwords-major-security-hurdles","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/","title":{"rendered":"Phishing Schemes, Passwords Major Security Hurdles"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-security-experts-at-black-hat-asia-2021-discuss-phishing-schemes-and-passwords-on-world-password-day\">Security experts at Black Hat Asia 2021 discuss phishing schemes and passwords on World Password Day. <\/h2>\n\n\n\n<p><a href=\"https:\/\/www.blackhat.com\/about.html\" target=\"_blank\" rel=\"noreferrer noopener\">Black Hat Asia 2021<\/a> was an all-virtual event this year due to conronavirus restrictions. This year, the event happened to include World Password Day on May 6. While this day is typically reserved for promoting safer password practices, security experts at the event provided a sobering perspective on cybersecurity, including complex password requirements. The bottom line is that we are making it increasingly difficult for people to make good security decisions.<\/p>\n\n\n\n<p>Security experts Ken Munro (Pen Test Partners), Troy Hunt (Have I Been Pwned), Hunt\u2019s daughter and Vangelis Stykas (colleague of Munro) <a href=\"https:\/\/portswigger.net\/daily-swig\/troy-hunt-at-black-hat-asia-were-making-it-very-difficult-for-people-to-make-good-security-decisions\" target=\"_blank\" rel=\"noreferrer noopener\">ran through a scenario<\/a> highlighting how easy it is to hack into an IoT device. Munro, Hunt and his daughter simulated changing the geolocation of a child from tennis practice to the middle of the ocean. It is a parent\u2019s worst nightmare, thinking they know where their child is only to have it seem like they teleported somewhere else. The trio exploited an insecure direct object reference vulnerability in an IoT device.<\/p>\n\n\n\n<p>On top of this, Stykas successfully compromised an API flaw in the TicTocTrack kids watch. He was able to make a voice call through the device with zero interaction needed from the user. He then compromised other accounts by changing an identifier parameter. The patch addressing this actually created an even nastier regression bug.<\/p>\n\n\n\n<p>There are two major contributing factors to the ease in which threat actors gain access to our devices. Phishing schemes are fast becoming a really big problem. Even legitimate emails from companies can be perceived as phishing emails, which makes it difficult for users to know which links are safe to click and which ones are not. This is what threat actors rely on, and right now, it\u2019s working. Since threat actors aren\u2019t going to change something that is working, it\u2019s incredibly important for businesses to do everything they can to distinguish themselves from would-be attackers.<\/p>\n\n\n\n<p>The other half of phishing schemes has to do with manufacturers, too. It\u2019s not just that someone clicked a bad link, it\u2019s that someone clicked a bad link and doesn\u2019t know that the device they&#8217;re using has a known vulnerability that hasn\u2019t been patched. To be fair, sometimes a user simply hasn\u2019t updated their device, which is often the case with businesses.<\/p>\n\n\n\n<p>The second way threat actors gain access to our devices and information is with bad passwords. We\u2019ve talked about this for a long time,<a href=\"https:\/\/www.pwvconsultants.com\/blog\/password-managers-keep-your-information-secure\/\" target=\"_blank\" rel=\"noreferrer noopener\"> passwords are important<\/a> and password managers are the best way to keep track of all of your account information. This prevents you from recycling passwords, which becomes a problem when only one of your accounts is compromised, but others are now exposed because they share a password.<\/p>\n\n\n\n<p>Again, there\u2019s another aspect to this problem: Password criteria. Humans are not engineered to generate and remember random passwords, we need to have a connection to it. So when stringent requirements are imposed, like periodic password updates with minimum lengths, mixed case, numbers and symbols, we resort to using things we know, things we remember. The problem with that is that a threat actor can use publicly available information (for example, a social media profile) to guess what your password is. Luckily, most companies are switching to multi-factor authentication to make hacking accounts more difficult. Bonus: You can still use a password manager with 2FA.<\/p>\n\n\n\n<p>The biggest problem with cybersecurity today is that as things move to the digital realm, we foolishly believe that we are more secure, that we have a better understanding of it all. But the reality is that we just add insecurity because no one teaches us how to be secure online. Most people assume someone else is handling it or it doesn\u2019t apply to us. This is exactly why businesses need to put a bigger focus on cybersecurity training for employees. When they know how to be secure at work, they learn to be more secure at home and are less likely to bring a threat actor to the office via an infected device.<\/p>\n\n\n\n<p>Businesses are fast-tracking digital transformation, they aren\u2019t just going paperless, everything is becoming data-driven and virtual. Criminals will always exist in the physical world, and there\u2019s no reason to think that they won\u2019t always be in the digital world as well. We do everything we can to protect our homes, our brick-and-mortar buildings, the tangible things that mean something to us. When we start to treat digitization with the same respect and same attention to security,  then will we see improvements.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security experts at Black Hat Asia 2021 agree: Phishing schemes and password complexities make it hard to make good security decisions.<\/p>\n","protected":false},"author":1,"featured_media":1964,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[5,14],"tags":[36,1910,31,1962,32,927,17,571],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Phishing Schemes, Passwords Major Security Hurdles - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Security experts at Black Hat Asia 2021 agree: Phishing schemes and password complexities make it hard to make good security decisions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing Schemes, Passwords Major Security Hurdles\" \/>\n<meta property=\"og:description\" content=\"Security experts at Black Hat Asia 2021 agree: Phishing schemes and password complexities make it hard to make good security decisions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-24T19:34:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-24T19:34:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Phishing-Schemes-Passwords-Security-Hurdle-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1709\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Phishing Schemes, Passwords Major Security Hurdles\",\"datePublished\":\"2021-05-24T19:34:04+00:00\",\"dateModified\":\"2021-05-24T19:34:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/\"},\"wordCount\":782,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Phishing-Schemes-Passwords-Security-Hurdle-scaled.jpeg\",\"keywords\":[\"Business\",\"CyberSec\",\"Cybersecurity\",\"IoT devices\",\"Passwords\",\"phishing schemees\",\"Security\",\"technology\"],\"articleSection\":[\"Cyber Security\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/\",\"name\":\"Phishing Schemes, Passwords Major Security Hurdles - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Phishing-Schemes-Passwords-Security-Hurdle-scaled.jpeg\",\"datePublished\":\"2021-05-24T19:34:04+00:00\",\"dateModified\":\"2021-05-24T19:34:06+00:00\",\"description\":\"Security experts at Black Hat Asia 2021 agree: Phishing schemes and password complexities make it hard to make good security decisions.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Phishing-Schemes-Passwords-Security-Hurdle-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Phishing-Schemes-Passwords-Security-Hurdle-scaled.jpeg\",\"width\":2560,\"height\":1709,\"caption\":\"Concept of hacking or phishing a login and password with malware program\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing Schemes, Passwords Major Security Hurdles\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Phishing Schemes, Passwords Major Security Hurdles - PWV Consultants","description":"Security experts at Black Hat Asia 2021 agree: Phishing schemes and password complexities make it hard to make good security decisions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/","og_locale":"en_US","og_type":"article","og_title":"Phishing Schemes, Passwords Major Security Hurdles","og_description":"Security experts at Black Hat Asia 2021 agree: Phishing schemes and password complexities make it hard to make good security decisions.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-05-24T19:34:04+00:00","article_modified_time":"2021-05-24T19:34:06+00:00","og_image":[{"width":2560,"height":1709,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Phishing-Schemes-Passwords-Security-Hurdle-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Phishing Schemes, Passwords Major Security Hurdles","datePublished":"2021-05-24T19:34:04+00:00","dateModified":"2021-05-24T19:34:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/"},"wordCount":782,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Phishing-Schemes-Passwords-Security-Hurdle-scaled.jpeg","keywords":["Business","CyberSec","Cybersecurity","IoT devices","Passwords","phishing schemees","Security","technology"],"articleSection":["Cyber Security","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/","url":"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/","name":"Phishing Schemes, Passwords Major Security Hurdles - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Phishing-Schemes-Passwords-Security-Hurdle-scaled.jpeg","datePublished":"2021-05-24T19:34:04+00:00","dateModified":"2021-05-24T19:34:06+00:00","description":"Security experts at Black Hat Asia 2021 agree: Phishing schemes and password complexities make it hard to make good security decisions.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Phishing-Schemes-Passwords-Security-Hurdle-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Phishing-Schemes-Passwords-Security-Hurdle-scaled.jpeg","width":2560,"height":1709,"caption":"Concept of hacking or phishing a login and password with malware program"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/phishing-schemes-passwords-major-security-hurdles\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Phishing Schemes, Passwords Major Security Hurdles"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1954"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1954"}],"version-history":[{"count":4,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1954\/revisions"}],"predecessor-version":[{"id":1968,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1954\/revisions\/1968"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1964"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}