{"id":1974,"date":"2021-05-27T14:03:10","date_gmt":"2021-05-27T18:03:10","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1974"},"modified":"2021-05-27T14:03:13","modified_gmt":"2021-05-27T18:03:13","slug":"double-encryption-ransomware-a-rising-threat","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/","title":{"rendered":"Double-Encryption Ransomware a Rising Threat"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-ransomware-is-highly-popular-among-cyber-criminals-their-new-tactic-is-double-encryption-ransomware-forcing-victims-to-pay-twice\">Ransomware is highly popular among cyber-criminals. Their new tactic is double-encryption ransomware, forcing victims to pay twice.<\/h2>\n\n\n\n<p>Criminals of all kinds are forced to change the way they do things in order to continue their nefarious activities without being caught. Cyber-criminals are no different. It\u2019s long been known that threat actors, hackers change their tactics on a regular basis. Once a vulnerability is patched, they move on to look for the next one while continuing to exploit machines that haven\u2019t been updated. Phishing schemes have evolved to look like legitimate emails, and because those are so effective, ransomware is fast becoming a tool of choice for hackers. Now, though, there\u2019s a new tactic popping up that businesses must be aware of: Double-encryption ransomware.<\/p>\n\n\n\n<p>While ransomware is seen most often in the healthcare industry and other so-called soft-target industries, it is applicable and has been seen in every industry. The most common vector for ransomware is a phishing scheme. Someone clicks a bad link and, boom, malware implanted. The malware works its way through business systems and locks everything down. The business receives a note demanding ransom for the decryption key. With standard ransomware, if the business chooses to pay the ransom, they get the key and move on with the cleanup process. With double-encryption ransomware, a second key is required, meaning that the victim has to pay up again.<\/p>\n\n\n\n<p>There are a variety of ways this can work. In the past, double-encryption has typically involved two separate groups compromising the same victim at the same time. But Emsisoft, an antivirus company, says it has seen dozens of incidents where only one group or hacker intentionally layers two types of ransomware on top of each other.<\/p>\n\n\n\n<p>\u201cThe groups are constantly trying to work out which strategies are best, which net them the most money for the least amount of effort,\u201d <a href=\"https:\/\/www.wired.com\/story\/ransomware-double-encryption\/\">says Emsisoft threat analyst Brett Callow<\/a>. \u201cSo in this approach you have a single actor deploying two types of ransomware. The victim decrypts their data and discovers it\u2019s not actually decrypted at all.\u201d<\/p>\n\n\n\n<p>There are two distinct tactics identified by Emsisoft. One sees threat actors encrypting data with one form of ransomware and then re-encrypting it with a second form. The second tactic is a \u201cside-by-side encryption\u201d attack. In this case, some business systems are locked with one form of malware and other systems are locked with a different form. The victim doesn\u2019t know they can\u2019t access all of their data after the first decryption key is given and it doesn\u2019t unlock everything. In the second case, bad actors take steps to ensure that the two strains of malware used look similar enough to confuse incident responders.<\/p>\n\n\n\n<p>\u201cEven in a standard single-encryption ransomware case, recovery is often an absolute nightmare,\u201d Callow says. \u201cBut we are seeing this double-encryption tactic often enough that we feel it\u2019s something organizations should be aware of when considering their response.\u201d<\/p>\n\n\n\n<p>He\u2019s right that recovery is a nightmare after an attack. Even if you pay the ransom and get the decryption key and it actually works, there\u2019s often major cleanup that has to happen. It shines a light on the importance of a proper backup system. Because if someone attacks your business with ransomware, once you\u2019ve dealt with the incident, it\u2019s much easier to start fresh from backups than to have to clean old systems and data before they can be used again. This is why it is important to use the cloud, where there are backup guarantees. Even if it\u2019s not feasible to put everything in the cloud, there are definitely instances where local storage is necessary, putting as much there as possible is recommended.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hackers continually change their tactics<\/a>, it\u2019s something we\u2019ve discussed many times. In order to continue with their form of work, they have to adjust and adapt. Double-encryption ransomware attacks are an easy way for threat actors to capitalize on their activity, it doubles their financial gain in one attack.&nbsp;<\/p>\n\n\n\n<p>It\u2019s also important to note that threat actors will target the same business more than once, especially if ransom is paid. It\u2019s always about cost-effectiveness when it comes to paying ransom, but there are consequences to doing so. Keep in mind that whether it&#8217;s a double, side-by-side or repeat attack, once someone pays the ransom and are in it, they are more likely to pay again to get out of it because of the sunk cost fallacy. <\/p>\n\n\n\n<p>Businesses should remember that even if they do pay the ransom, which goes against everything law enforcement says to do, they still need to contact the authorities and report the attack. Law enforcement needs to know about attacks so they can spot trends and make other businesses aware.\u00a0<\/p>\n\n\n\n<p>Make sure your business is prepared, bring in an expert to review your security protocols and ensure you are properly using your cloud services. Have them analyze your backup system and make sure that critical information is regularly backed up and secured, and have them review your incident response to ensure all steps are covered.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Double-encryption ransomware forces victims to pay for two decryption keys. This allows hackers to double their gains in a single attack.<\/p>\n","protected":false},"author":1,"featured_media":1980,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1969,5,27,26],"tags":[2320,1910,31,2319,928,1745,21,2115],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Double-Encryption Ransomware a Rising Threat - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Double-encryption ransomware forces victims to pay for two decryption keys. This allows hackers to double their gains in a single attack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Double-Encryption Ransomware a Rising Threat\" \/>\n<meta property=\"og:description\" content=\"Double-encryption ransomware forces victims to pay for two decryption keys. This allows hackers to double their gains in a single attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-27T18:03:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-27T18:03:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Double-Encrypted-Ransomware-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Double-Encryption Ransomware a Rising Threat\",\"datePublished\":\"2021-05-27T18:03:10+00:00\",\"dateModified\":\"2021-05-27T18:03:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/\"},\"wordCount\":861,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Double-Encrypted-Ransomware-scaled.jpeg\",\"keywords\":[\"cyber-criminals\",\"CyberSec\",\"Cybersecurity\",\"Double-Encryption Ransomware\",\"hackers\",\"malware\",\"Ransomware\",\"Threat Actor\"],\"articleSection\":[\"Business\",\"Cyber Security\",\"Malware\",\"Ransomware\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/\",\"name\":\"Double-Encryption Ransomware a Rising Threat - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Double-Encrypted-Ransomware-scaled.jpeg\",\"datePublished\":\"2021-05-27T18:03:10+00:00\",\"dateModified\":\"2021-05-27T18:03:13+00:00\",\"description\":\"Double-encryption ransomware forces victims to pay for two decryption keys. This allows hackers to double their gains in a single attack.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Double-Encrypted-Ransomware-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Double-Encrypted-Ransomware-scaled.jpeg\",\"width\":2560,\"height\":1707,\"caption\":\"encryption algorithms and cryptography concepts: matching public and private keys made of electronic microchip circuits with led lights\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Double-Encryption Ransomware a Rising Threat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Double-Encryption Ransomware a Rising Threat - PWV Consultants","description":"Double-encryption ransomware forces victims to pay for two decryption keys. This allows hackers to double their gains in a single attack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/","og_locale":"en_US","og_type":"article","og_title":"Double-Encryption Ransomware a Rising Threat","og_description":"Double-encryption ransomware forces victims to pay for two decryption keys. This allows hackers to double their gains in a single attack.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-05-27T18:03:10+00:00","article_modified_time":"2021-05-27T18:03:13+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Double-Encrypted-Ransomware-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Double-Encryption Ransomware a Rising Threat","datePublished":"2021-05-27T18:03:10+00:00","dateModified":"2021-05-27T18:03:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/"},"wordCount":861,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Double-Encrypted-Ransomware-scaled.jpeg","keywords":["cyber-criminals","CyberSec","Cybersecurity","Double-Encryption Ransomware","hackers","malware","Ransomware","Threat Actor"],"articleSection":["Business","Cyber Security","Malware","Ransomware"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/","url":"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/","name":"Double-Encryption Ransomware a Rising Threat - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Double-Encrypted-Ransomware-scaled.jpeg","datePublished":"2021-05-27T18:03:10+00:00","dateModified":"2021-05-27T18:03:13+00:00","description":"Double-encryption ransomware forces victims to pay for two decryption keys. This allows hackers to double their gains in a single attack.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Double-Encrypted-Ransomware-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Double-Encrypted-Ransomware-scaled.jpeg","width":2560,"height":1707,"caption":"encryption algorithms and cryptography concepts: matching public and private keys made of electronic microchip circuits with led lights"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/double-encryption-ransomware-a-rising-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Double-Encryption Ransomware a Rising Threat"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1974"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1974"}],"version-history":[{"count":5,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1974\/revisions"}],"predecessor-version":[{"id":1984,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1974\/revisions\/1984"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1980"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}