<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=654132&amp;fmt=gif">

Log4J Vulnerability Update

At Truyo we take data privacy and security very seriously.Recently a security vulnerability was reported in the open-source Java library “Log4J” that could allow attackers to execute code and expose or delete personal data. Our platform does not directly use this library. We are taking proactive steps to search all third-party software we use to determine if that software leverages a vulnerable version of Log4J and will communicate any findings. This is in addition to our ongoing efforts of scanning all software components for vulnerabilities as part of the software delivery process. If you have any questions, please contact your account manager or reach out to support@truyo.com for additional information.

Log4J Vulnerability Update

At Truyo we take data privacy and security very seriously.Recently a security vulnerability was reported in the open-source Java library “Log4J” that could allow attackers to execute code and expose or delete personal data. Our platform does not directly use this library. We are taking proactive steps to search all third-party software we use to determine if that software leverages a vulnerable version of Log4J and will communicate any findings. This is in addition to our ongoing efforts of scanning all software components for vulnerabilities as part of the software delivery process. If you have any questions, please contact your account manager or reach out to support@truyo.com for additional information.

Forrester Wave Announcement: Truyo Named Strong Performer

Report notes Truyo’s “management and fulfillment of individual privacy rights capabilities are some of the best in the market

4 Tips for Choosing the Right Privacy Tool

First, there was technology, then came the data collection. As that technology rapidly grew more intelligent and pervasive, so too did the data. As the oceans of data that companies handle on a regular basis have grown and evolved, so have the often gray areas of consumer privacy. 

How to Modify Your GDPR SAR Practices for the CCPA

IAPP Webinar march 2019 how to GDPR to CCPA

Original broadcast date: March 21, 2019 via IAPP Webconference

The answer to regulatory uncertainty? A future-proof solution

There is tremendous uncertainty in the privacy rights regulatory environment today. The most prominent regulations – GDPR and CCPA – have significant differences. They’re going to continue to change. And new regulations will continue to emerge. Yet with GDPR in full effect, the “wait and see” approach is not an option. What is: a privacy rights management solution that’s future proof against the uncertainty.

The writing is on the wall: European protections pave the way for blockchain

Evolving regulations in privacy and data security are pressuring companies to accommodate user demands for control over their personal information.  The General Data Protection Regulation (GDPR) represents the largest change to European Union (EU) data protection laws in decades, and requires companies that do business in the region to provide increased protections for EU users.

 

Recent Posts

India's Joint Parliamentary Committee Announces Recommended Changes to Privacy Bill

Last month, the Indian Joint Parliamentary Committee submitted its report on the 2019 Personal Data Protection Bill after two years of consideration, ...

Log4J Vulnerability Update

At Truyo we take data privacy and security very seriously. Recently a security vulnerability was reported in the open-source Java library “Log4J” that...

Forrester Wave Announcement: Truyo Named Strong Performer

Report notes Truyo’s “management and fulfillment of individual privacy rights capabilities are some of the best in the market ” PHOENIX (Dec. 09, 2021...

Human Error: The Pitfalls of Manual SAR Response

In the age of information, organizations have increased the amount of consumer data housed in structured and unstructured environments. As consumers b...