Skip to content

Canopy Blog: Ediscovery

Canopy logo with title text that says Cyber Insurers: Stop Getting Ripped Off on Post-Breach Data Mining

Cyber Insurers: Stop Getting Ripped Off on Post-Breach Data Mining

Cyber insurers, do your data mining panel providers use ediscovery tools & techniques for post-breach incident response & PII/PHI review? If yes: You need to read this post,..

Read More

Canopy logo with

The Evolution of Data Breach Response Laws, Methods, & Tech in Canada

Canopy recently hosted a LinkedIn Live webinar featuring three experts on the Canadian data breach response market: Mikel Pearce, Director of Business Development, Canada & UK at..

Read More

Canopy logo with

Experts Weigh In On Data Breach Response, Part 2: What to Do, Who to Call, & How to Proactively Mitigate Risk

Canopy recently moderated an intriguing discussion on LinkedIn Live featuring four experts: Allison Bender, Partner at Dentons; Brandy Griffin, Director of Cybersecurity..

Read More

Data Breach Regulations, Prevention, and Response with Canopy logo and Fit4Privacy podcast art

Canopy Discusses Data Breach Regulations, Prevention, and Response on the Fit4Privacy Podcast

What’s the inside scoop on data breach response and preparedness? 🌳🌳🌳Canopy recently joined Punit Bhatia on The Fit4Privacy Podcast to discuss data privacy regulations,..

Read More

Experts Weigh In On Data Breach Response, Part 1: Process, Technology, & the Influence of Cyber Insurance

Canopy recently moderated an intriguing discussion on LinkedIn Live featuring four experts: Allison Bender, Partner at Dentons; Brandy Griffin, Director of Cybersecurity..

Read More

Graphic with logos for The Data Diva Talks Privacy Podcast and Canopy

Canopy Talks Data Privacy, Cybersecurity, & Breach Response with “The Data Diva”

Having journeyed from ediscovery into data breach response, Adi Elliott knows emerging technologies. And as Canopy’s chief revenue officer, he’s also an authority on applying AI..

Read More

Square Peg, Round Hole: Ediscovery Isn't a Good Fit for Data Breach Response

Square Peg, Round Hole: Why Ediscovery Isn’t a Good Fit for Data Breach Response

“Can I use ediscovery to respond to a data breach?” Technically, the answer is “yes,” — but should you? That’s the real question, and a wrong decision could compromise your..

Read More

person with magnifying glass looking for breached data in documents

Data Mining for Protected Data with Canopy

Canopy Software recently released a case study highlighting how our data mining innovations decrease the time our customers spend on protected-data discovery and data breach..

Read More

Person holding a plate with an apple and a plate with an orange

9 Differences Between Data Breach and Litigation Reviews

In a cyber incident response, data must be scanned for Personally Identifiable Information (PII) and Protected Health Information (PHI) to determine if a data breach of protected..

Read More

Person trying to fit a square block into a round hole

Challenging Convention: Ediscovery Software Shouldn't Be Used for Data Breach Response

Data privacy regulations are growing in number and complexity, but one thing remains the same through this evolution: the time constraints are severe. That’s just one of the many..

Read More