Blog

9 Differences between Data Breach and Litigation Reviews, Part 3

In a cyber incident response, data must be scanned for Personally Identifiable Information (PII) and Protected Health …

9 Differences between Data Breach and Litigation Reviews, Part 2

In a cyber incident response, data must be scanned for Personally Identifiable Information (PII) and Protected Health …

9 Differences between Data Breach and Litigation Reviews, Part 1

In a cyber incident response, data must be scanned for Personally Identifiable Information (PII) and Protected Health …

CanopySecure™ supporting ‘The Canopy Project’ from The Earth Day Network

As a company, Canopy Software is dedicated to developing advanced technologies for protected-data discovery and quick …

Unpacking the Jargon of Data Breach Response

Canopy is the core of a unique process in the ever-growing field of data breach response. A delicate balance of people, …

Are You Prepared to Protect Your Workforce, Your Company, and Your Data During the COVID-19 Pandemic?

The concept of “telecommuting” is nothing new, and as advancements in technology and Internet bandwidth have grown over …

Challenging Convention: eDiscovery software shouldn't be used for data breach response

Data privacy regulations are growing in number and complexity, but one thing remains the same through this evolution: …

3 Clear Predictions for Data Privacy Technology in 2020

Data privacy regulations are an important rebound to our increasingly digital and connected world, but they are moving …

Make an Incident Response Plan

At Legalweek New York 2019, Canopy attended the Beyond The Attack – Legal & Ethical Considerations In Breach …

Four recommendations to reduce abnormal churn after a data breach

Abnormal churn, defined as the loss of customers due to a data breach, is on the rise in the United States. According to …