Blog
Consolidating 4 Billion PHI Entities
As PHI breaches including billions of entities become more common, review teams need to adjust how they approach these …
Canopy Named to the Northern Virginia Technology Council’s Tech 100 List
With the holiday season upon us and 2020 coming to a close, there’s a lot for us to be thankful for at Canopy. From our …
4 Monsters Lurking in Your Data Breach Review
Learn about 4 monsters that haunt data breach review processes. Contact us to ward them off.
Double, double toil and …
Data Mining for Protected Data with Canopy
Canopy Software recently released a case study highlighting how our data mining innovations decrease the time our …
9 Differences between Data Breach and Litigation Reviews, Part 3
In a cyber incident response, data must be scanned for Personally Identifiable Information (PII) and Protected Health …
9 Differences between Data Breach and Litigation Reviews, Part 2
In a cyber incident response, data must be scanned for Personally Identifiable Information (PII) and Protected Health …
9 Differences between Data Breach and Litigation Reviews, Part 1
In a cyber incident response, data must be scanned for Personally Identifiable Information (PII) and Protected Health …
CanopySecure™ supporting ‘The Canopy Project’ from The Earth Day Network
As a company, Canopy Software is dedicated to developing advanced technologies for protected-data discovery and quick …
Unpacking the Jargon of Data Breach Response
Canopy is the core of a unique process in the ever-growing field of data breach response. A delicate balance of people, …
Are You Prepared to Protect Your Workforce, Your Company, and Your Data During the COVID-19 Pandemic?
The concept of “telecommuting” is nothing new, and as advancements in technology and Internet bandwidth have grown over …
Challenging Convention: eDiscovery software shouldn't be used for data breach response
Data privacy regulations are growing in number and complexity, but one thing remains the same through this evolution: …
3 Clear Predictions for Data Privacy Technology in 2020
Data privacy regulations are an important rebound to our increasingly digital and connected world, but they are moving …
Make an Incident Response Plan
At Legalweek New York 2019, Canopy attended the Beyond The Attack – Legal & Ethical Considerations In Breach …
Four recommendations to reduce abnormal churn after a data breach
Abnormal churn, defined as the loss of customers due to a data breach, is on the rise in the United States. According to …