Canopy Blog

Tips, updates, and more from the leaders in AI-powered data breach response software.

Square Peg, Round Hole: Ediscovery Isn't a Good Fit for Data Breach Response

Square Peg, Round Hole: Why Ediscovery Isn’t a Good Fit for Data Breach Response

“Can I use ediscovery to respond to a data breach?” Technically, the answer is “yes,” — but should you? That’s the real question, and a wrong decision could compromise your..

Read More

people saving time in piggy bank

Consolidating 4 Billion PHI Entities in Hospital Data Breach Response

As PHI breaches including billions of entities become more common, review teams need to adjust how they approach these incidents.

Read More

What dangers are lurking in your data?

4 Monsters Lurking in Your Data Breach Review

Learn about the 4 monsters that haunt data breach review processes. Contact us to ward them off.

Read More

person with magnifying glass looking for breached data in documents

Data Mining for Protected Data with Canopy

Canopy Software recently released a case study highlighting how our data mining innovations decrease the time our customers spend on protected-data discovery and data breach..

Read More

Person holding a plate with an apple and a plate with an orange

9 Differences Between Data Breach and Litigation Reviews

In a cyber incident response, data must be scanned for Personally Identifiable Information (PII) and Protected Health Information (PHI) to determine if a data breach of protected..

Read More

team of employees planting trees for a greener future

CanopySecure™ Supports The Canopy Project from Earth Day Network

As a company, Canopy Software is dedicated to developing advanced technologies for protected-data discovery and quick notification when one’s PII is breached. One of our core..

Read More

man processing breached data on computer powered by AI/machine learning brain

Unpacking the Jargon of Data Breach Response

Canopy is the core of a unique process in the ever-growing field of data breach response. A delicate balance of people, process, and technology come together on every project to..

Read More

remote employee working at home on computer

Protect Your Workforce, Company, and Data During the Pandemic

The concept of “telecommuting” is nothing new, and as advancements in technology and Internet bandwidth have grown over the years, the remote workforce has grown tremendously yet..

Read More

Person trying to fit a square block into a round hole

Challenging Convention: Ediscovery Software Shouldn't Be Used for Data Breach Response

Data privacy regulations are growing in number and complexity, but one thing remains the same through this evolution: the time constraints are severe. That’s just one of the many..

Read More

person with a telescope on a cliff overlooking the data privacy tech landscape

3 Clear Predictions for Data Privacy Technology in 2020

Data privacy regulations are an important rebound to our increasingly digital and connected world, but they are moving targets fraught with complexities and challenging time..

Read More