Skip to content

Canopy Blog

Expert tips, insights, and more from the global leaders in AI-powered privacy and data breach software.

Canopy Talks PII, Data Breach Response, & Privacy on BarCode Podcast

Canopy COO Adi Elliott recently joined Chris Glanden, host of BarCode podcast, to chat about data breach response, incident response, preventing data loss, the application of AI..

Read More

Canopy logo with people working on security badge and text reading

The U.S.’s New Breach Reporting Law & What It Means for Incident Response Teams

On March 15, 2022, President Biden signed the Cyber Incident Reporting for Critical Infrastructure Act into law as part of the Consolidated Appropriations Act of 2022, an omnibus..

Read More

How AI Is Transforming Data Breach Response with Canopy & She Said Privacy He Said Security Podcast

How AI Is Transforming Data Breach Response & Risk Mitigation Efforts

🌳🌳🌳Canopy recently joined Jodi and Justin Daniels on their podcast, She Said Privacy, He Said Security, to discuss using AI for Data Breach Response.

Read More

woman working on computer with canopy logo and text: 6 ways that technology is transforming the data privacy job market

6 Ways that Technology Is Transforming the Data Privacy Job Market

On Data Privacy Day 2022, 🌳🌳🌳Canopy COO Adi Elliott joined three other industry experts to discuss how technology is affecting the job market for data privacy professionals at..

Read More

Graphic with logos for The Data Diva Talks Privacy Podcast and Canopy

Canopy Talks Data Privacy, Cybersecurity, & Breach Response with “The Data Diva”

Having journeyed from ediscovery into data breach response, Adi Elliott knows emerging technologies. And as Canopy’s chief revenue officer, he’s also an authority on applying AI..

Read More

Square Peg, Round Hole: Ediscovery Isn't a Good Fit for Data Breach Response

Square Peg, Round Hole: Why Ediscovery Isn’t a Good Fit for Data Breach Response

“Can I use ediscovery to respond to a data breach?” Technically, the answer is “yes,” — but should you? That’s the real question, and a wrong decision could compromise your..

Read More

people saving time in piggy bank

Consolidating 4 Billion PHI Entities in Hospital Data Breach Response

As PHI breaches including billions of entities become more common, review teams need to adjust how they approach these incidents.

Read More

What dangers are lurking in your data?

4 Monsters Lurking in Your Data Breach Review

Learn about the 4 monsters that haunt data breach review processes. Contact us to ward them off.

Read More

person with magnifying glass looking for breached data in documents

Data Mining for Protected Data with Canopy

Canopy Software recently released a case study highlighting how our data mining innovations decrease the time our customers spend on protected-data discovery and data breach..

Read More

Person holding a plate with an apple and a plate with an orange

9 Differences Between Data Breach and Litigation Reviews

In a cyber incident response, data must be scanned for Personally Identifiable Information (PII) and Protected Health Information (PHI) to determine if a data breach of protected..

Read More