{"id":920,"date":"2020-10-08T11:00:16","date_gmt":"2020-10-08T15:00:16","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=920"},"modified":"2020-10-08T11:00:18","modified_gmt":"2020-10-08T15:00:18","slug":"beware-hp-device-manager-has-backdoor","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/","title":{"rendered":"Beware: HP Device Manager Has Backdoor"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">The backdoor can gain unauthorized access to remote command execution and be exploited to achieve privilege. Businesses should follow mitigation processes provided by HP.<\/h2>\n\n\n\n<p>There has been an uptick in cyber-attacks and data breaches in 2020. While this increases each year, this year feels especially hard hit, likely due to the COVID-19 pandemic. With everyone working from home, businesses are strained and systems are breaking down, making them easier to exploit. On top of that, now businesses that use HP Device Manager have to take action to mitigate a vulnerability that was put there by HP itself.<\/p>\n\n\n\n<p>According to <a href=\"https:\/\/www.theregister.com\/2020\/09\/30\/hp_device_manager_backdoor_database_account\/\" target=\"_blank\" rel=\"noreferrer noopener\">The Register<\/a>, \u201cNicky Bloor, founder of Cognitous Cyber Security, reports that an HP Inc programmer appears to have set up an insecure user account in a database within <a href=\"https:\/\/www8.hp.com\/us\/en\/cloud-computing\/thin-clients\/software.html\">HP Device Manager<\/a> (HPDM). He found that the account can be exploited to achieve privilege escalation and, in conjunction with other flaws, gain unauthorized remote command execution as SYSTEM.<\/p>\n\n\n\n<p>This is bad: if you can reach a vulnerable installation of this device manager on a network, you can gain admin-level control over its machine and the thin clients it controls. HPDM typically runs on a Windows-powered server, and directs multiple Windows clients.\u201d<\/p>\n\n\n\n<p>This is a nightmare for businesses that use HPDM, and it\u2019s a dream for an attacker. Bad actors, like any other criminal, want to get the most bang for their buck. They don\u2019t want to exert a lot of energy, but they want a big payday. If a bad actor gains admin-level control over one machine, they can use that access to gain entry to other machines. They can practically do whatever it is they want to do and they haven\u2019t broken a sweat.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cyber-observer.com\/cyber-news-29-statistics-for-2020-cyber-observer\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Observer<\/a> says the 8 most common causes of a data breach are:<\/p>\n\n\n\n<ul><li>Weak and Stolen Credentials, a.k.a. Passwords<\/li><li>Back Doors, Application Vulnerabilities<\/li><li>Malware<\/li><li>Social Engineering<\/li><li>Too Many Permissions<\/li><li>Insider Threats<\/li><li>Improper Configuration and User Error<\/li><\/ul>\n\n\n\n<p>Back doors, application vulnerabilities and improper configuration all fit the HP problem.<\/p>\n\n\n\n<p>Bloor brought this vulnerability to the attention of HP, which did not immediately respond. When he said he was going to go public, they quickly changed their tune. On September 30, HP <a rel=\"noreferrer noopener\" href=\"https:\/\/support.hp.com\/us-en\/document\/c06921908\" target=\"_blank\">acknowledged the problem and shared an update<\/a> on the resolution timeline. Weak Cipher and Remote Method Invocation are affected on all versions of HPDM, while Elevation of Privilege affects versions 5.0.0 to 5.0.3. The page goes on to outline mitigations you can take while their security team works on a patch, so be sure to read their resolution guidelines to limit your risk.<\/p>\n\n\n\n<p>Businesses are so trained and on high alert to look for <a href=\"https:\/\/www.pwvconsultants.com\/blog\/data-breaches-are-a-major-cybersecurity-threat\/\" target=\"_blank\" rel=\"noreferrer noopener\">data breaches via a cyber-attack<\/a>, whether it\u2019s <a href=\"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware<\/a> or <a href=\"https:\/\/www.pwvconsultants.com\/blog\/four-major-cybersecurity-threats-2020\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing or something else<\/a>. They aren\u2019t looking at their management system for vulnerabilities, they trust their provider to ensure that security.\u00a0<\/p>\n\n\n\n<p>This is the exact reason businesses should always hire an expert when implementing something new, and should employ someone who can maintain that system as well as keep it updated. When something new is being implemented, no matter if you trust where it came from, your expert should ensure there are no vulnerabilities built into the system. You have to do whatever it takes to protect your business, and that means protecting your customers, clients, business partners and proprietary information.<\/p>\n\n\n\n<p>We continually discuss how important it is to safeguard sensitive information, how important it is to hire an expert to <a href=\"https:\/\/www.pwvconsultants.com\/blog\/why-you-must-hire-an-expert-for-cloud-migration\/\" target=\"_blank\" rel=\"noreferrer noopener\">assist with cloud migration<\/a>, security protocols and having proper backups in place. Vulnerabilities are a problem, bad actors, <a href=\"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/\" target=\"_blank\" rel=\"noreferrer noopener\">insider threats and hackers<\/a> are a problem. Ensure that you aren\u2019t the next victim, build more into your <a href=\"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">InfoSec<\/a> and CyberSec budgets because this isn\u2019t going to go anywhere. Protection is paramount to success.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A cyber security company found a major flaw in HP Device Manager. Be sure to implement the suggested mitigations until a patch is released.<\/p>\n","protected":false},"author":1,"featured_media":924,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[599,5,14],"tags":[1169,686,31,926,1870,1869,1871,1872],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Beware: HP Device Manager Has Backdoor - PWV Consultants<\/title>\n<meta name=\"description\" content=\"A cyber security company found a major flaw in HP Device Manager. Be sure to implement the suggested mitigations until a patch is released.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beware: HP Device Manager Has Backdoor\" \/>\n<meta property=\"og:description\" content=\"A cyber security company found a major flaw in HP Device Manager. Be sure to implement the suggested mitigations until a patch is released.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-08T15:00:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-08T15:00:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/logo-2834458_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Beware: HP Device Manager Has Backdoor\",\"datePublished\":\"2020-10-08T15:00:16+00:00\",\"dateModified\":\"2020-10-08T15:00:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/\"},\"wordCount\":629,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/logo-2834458_1920.jpg\",\"keywords\":[\"Application Security\",\"cyber sec\",\"Cybersecurity\",\"data breach\",\"Hewlett-Packard\",\"HP\",\"HP Device Manager\",\"HPDM\"],\"articleSection\":[\"Coding\",\"Cyber Security\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/\",\"name\":\"Beware: HP Device Manager Has Backdoor - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/logo-2834458_1920.jpg\",\"datePublished\":\"2020-10-08T15:00:16+00:00\",\"dateModified\":\"2020-10-08T15:00:18+00:00\",\"description\":\"A cyber security company found a major flaw in HP Device Manager. Be sure to implement the suggested mitigations until a patch is released.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/logo-2834458_1920.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/logo-2834458_1920.jpg\",\"width\":1920,\"height\":1280,\"caption\":\"Image by Guillaume Preat from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Beware: HP Device Manager Has Backdoor\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Beware: HP Device Manager Has Backdoor - PWV Consultants","description":"A cyber security company found a major flaw in HP Device Manager. Be sure to implement the suggested mitigations until a patch is released.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/","og_locale":"en_US","og_type":"article","og_title":"Beware: HP Device Manager Has Backdoor","og_description":"A cyber security company found a major flaw in HP Device Manager. Be sure to implement the suggested mitigations until a patch is released.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-10-08T15:00:16+00:00","article_modified_time":"2020-10-08T15:00:18+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/logo-2834458_1920.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Beware: HP Device Manager Has Backdoor","datePublished":"2020-10-08T15:00:16+00:00","dateModified":"2020-10-08T15:00:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/"},"wordCount":629,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/logo-2834458_1920.jpg","keywords":["Application Security","cyber sec","Cybersecurity","data breach","Hewlett-Packard","HP","HP Device Manager","HPDM"],"articleSection":["Coding","Cyber Security","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/","url":"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/","name":"Beware: HP Device Manager Has Backdoor - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/logo-2834458_1920.jpg","datePublished":"2020-10-08T15:00:16+00:00","dateModified":"2020-10-08T15:00:18+00:00","description":"A cyber security company found a major flaw in HP Device Manager. Be sure to implement the suggested mitigations until a patch is released.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/logo-2834458_1920.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/logo-2834458_1920.jpg","width":1920,"height":1280,"caption":"Image by Guillaume Preat from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/beware-hp-device-manager-has-backdoor\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Beware: HP Device Manager Has Backdoor"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/920"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=920"}],"version-history":[{"count":3,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/920\/revisions"}],"predecessor-version":[{"id":926,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/920\/revisions\/926"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/924"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=920"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=920"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}