{"id":2158,"date":"2021-07-30T10:00:00","date_gmt":"2021-07-30T14:00:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=2158"},"modified":"2021-07-29T18:58:41","modified_gmt":"2021-07-29T22:58:41","slug":"tsa-dhs-announce-cyber-protection-orders","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/","title":{"rendered":"TSA, DHS Announce Cyber Protection Orders"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-the-tsa-and-department-of-homeland-security-announced-new-rules-for-critical-pipelines-but-the-cyber-protection-order-begs-the-question-why-stop-there\">The TSA and Department of Homeland Security announced new rules for critical pipelines. But, the cyber protection order begs the question, why stop there?<\/h2>\n\n\n\n<p>Cybersecurity attacks continue to rise and plague businesses worldwide. Supply chain attacks are becoming a trend as threat actors look to disrupt our economy for financial gain. There has long been a need for more stringent legislation and regulations around cybersecurity, especially for private companies, and the Department of Homeland Security in conjunction with the Transportation Security Administration seem to agree. Sort of. Last week, the TSA announced new rules around cyber protection and cybersecurity and for critical pipelines.<\/p>\n\n\n\n<p>The announcement marks the first time a federal agency has mandated cybersecurity protocols for privately-owned companies. The idea has been proposed in the past, but private companies lobbied to get rid of it, and economists warned that it could set the U.S. behind other countries if implemented. Now, though, life looks very different. We\u2019re still in the middle of an incredibly deadly pandemic that\u2019s affected the way the world functions. Threat actors, bored with scanning IP addresses and needing a new challenge, have adopted attacking supply chain providers. The recent attack on the Colonial Pipeline is the main propagator of this move, though, because it specifically targets chemical and liquid pipelines.<\/p>\n\n\n\n<p><a href=\"https:\/\/nsarchive.gwu.edu\/news\/cyber-vault\/2021-07-23\/cyber-brief-after-colonial-pipeline-dhs-less-advice-more-rules\" target=\"_blank\" rel=\"noreferrer noopener\">The cyber protection order<\/a> mandates \u201cowners and operators of TSA-designated critical pipelines that transport hazardous liquids and natural gas to implement a number of urgently needed protections against cyberintrusions.\u201d Right now, the only affected industry is the pipeline industry, which must adhere to the following:<\/p>\n\n\n\n<p>\u2022 Develop and implement a \u201ccontingency and recovery\u201d plan for cyberintrusions;<\/p>\n\n\n\n<p>\u2022 Compare the plan with DHS standards, identify gaps, develop measures to fill them, and gain approval for them from the Cybersecurity and Infrastructure Security Agency, or CISA;*<\/p>\n\n\n\n<p>\u2022 Appoint and identify, within seven days, a cyber coordinator (and a backup cyber coordinator) who is available to the DHS\u2019s CISA officials \u201c24\/7\u201d; and<\/p>\n\n\n\n<p>\u2022 Report all cyberintrusions to CISA within 12 hours of the incident.<\/p>\n\n\n\n<p>These new requirements were previously guidance issued by the TSA in 2018, but now are mandated. This shows that the federal government is ready to move away from its previously hands-off approach and is now willing to take action and set standards for cyber protections that businesses are required to follow.<\/p>\n\n\n\n<p>This is another instance of the government making a great first step, but is also not quite enough. Why is this strictly limited to the pipeline industry? That\u2019s certainly not the only place that our economy can be impacted by a cyber attack, ransomware or otherwise. The SolarWinds hack is another example of a supply chain attack, and while tech companies should be among those with the highest levels of security, that\u2019s not always the case. Which is why standardized regulations are so important, regulations that apply to every business.<\/p>\n\n\n\n<p>Still, this opens the door for additional federal action in the cyber realm. Whether it\u2019s setting additional standards in other industries or adjusting the punishment doled out to those who are caught perpetuating the cycle, the government is getting involved. So far, while past administrations remained at a distance, the Biden administration <a href=\"https:\/\/www.pwvconsultants.com\/blog\/doj-to-treat-ransomware-attacks-like-terrorism\/\" target=\"_blank\" rel=\"noreferrer noopener\">seems to be taking a different direction<\/a>. And it\u2019s a much needed direction as threat actors become more bold and look to escalate attacks farther than ever.<\/p>\n\n\n\n<p>Any new rule, regulation, law or compliance guideline must be thoroughly understood to ensure that your business is following the rules. The fines and punishments for breaking those rules can be costly. Make sure your business is ready for the regulations that might be coming. Do an audit of your business, look for gaping holes and fix them. Then bring in an outsider, an expert who can review your business practices and security protocols. Make sure your internal team doesn&#8217;t miss anything. And make sure that you\u2019re adhering to the most up-to-date regulations, laws and compliance guidelines to avoid those costly penalties.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The first federal cyber protection order has been laid out. It&#8217;s a good first step, but falls short of what is actually needed.<\/p>\n","protected":false},"author":1,"featured_media":2170,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[6,5,2334],"tags":[1910,31,2393,2394,2397,2396,1819,2395,2391,2392],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TSA, DHS Announce Cyber Protection Orders - PWV Consultants<\/title>\n<meta name=\"description\" content=\"The first federal cyber protection order has been laid out. It&#039;s a good first step, but falls short of what is actually needed.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TSA, DHS Announce Cyber Protection Orders\" \/>\n<meta property=\"og:description\" content=\"The first federal cyber protection order has been laid out. It&#039;s a good first step, but falls short of what is actually needed.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-30T14:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-29T22:58:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/TSA-DHS-Announce-Regulations-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1317\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"TSA, DHS Announce Cyber Protection Orders\",\"datePublished\":\"2021-07-30T14:00:00+00:00\",\"dateModified\":\"2021-07-29T22:58:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/\"},\"wordCount\":665,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/TSA-DHS-Announce-Regulations-scaled.jpeg\",\"keywords\":[\"CyberSec\",\"Cybersecurity\",\"Department of Homeland Security\",\"DHS\",\"mandate\",\"pipeline\",\"regulations\",\"Supply Chain\",\"Transportation Security Administration\",\"TSA\"],\"articleSection\":[\"Compliance\",\"Cyber Security\",\"Regulations &amp; Legislation\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/\",\"name\":\"TSA, DHS Announce Cyber Protection Orders - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/TSA-DHS-Announce-Regulations-scaled.jpeg\",\"datePublished\":\"2021-07-30T14:00:00+00:00\",\"dateModified\":\"2021-07-29T22:58:41+00:00\",\"description\":\"The first federal cyber protection order has been laid out. It's a good first step, but falls short of what is actually needed.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/TSA-DHS-Announce-Regulations-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/TSA-DHS-Announce-Regulations-scaled.jpeg\",\"width\":2560,\"height\":1317,\"caption\":\"Compliance Rules Law Regulation Policy Business Technology concept.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TSA, DHS Announce Cyber Protection Orders\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"TSA, DHS Announce Cyber Protection Orders - PWV Consultants","description":"The first federal cyber protection order has been laid out. It's a good first step, but falls short of what is actually needed.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/","og_locale":"en_US","og_type":"article","og_title":"TSA, DHS Announce Cyber Protection Orders","og_description":"The first federal cyber protection order has been laid out. It's a good first step, but falls short of what is actually needed.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-07-30T14:00:00+00:00","article_modified_time":"2021-07-29T22:58:41+00:00","og_image":[{"width":2560,"height":1317,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/TSA-DHS-Announce-Regulations-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"TSA, DHS Announce Cyber Protection Orders","datePublished":"2021-07-30T14:00:00+00:00","dateModified":"2021-07-29T22:58:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/"},"wordCount":665,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/TSA-DHS-Announce-Regulations-scaled.jpeg","keywords":["CyberSec","Cybersecurity","Department of Homeland Security","DHS","mandate","pipeline","regulations","Supply Chain","Transportation Security Administration","TSA"],"articleSection":["Compliance","Cyber Security","Regulations &amp; Legislation"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/","url":"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/","name":"TSA, DHS Announce Cyber Protection Orders - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/TSA-DHS-Announce-Regulations-scaled.jpeg","datePublished":"2021-07-30T14:00:00+00:00","dateModified":"2021-07-29T22:58:41+00:00","description":"The first federal cyber protection order has been laid out. It's a good first step, but falls short of what is actually needed.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/TSA-DHS-Announce-Regulations-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/TSA-DHS-Announce-Regulations-scaled.jpeg","width":2560,"height":1317,"caption":"Compliance Rules Law Regulation Policy Business Technology concept."},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/tsa-dhs-announce-cyber-protection-orders\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"TSA, DHS Announce Cyber Protection Orders"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2158"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=2158"}],"version-history":[{"count":4,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2158\/revisions"}],"predecessor-version":[{"id":2173,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2158\/revisions\/2173"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/2170"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=2158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=2158"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=2158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}