Canopy Team

Data Mining for Protected Data with Canopy
Canopy Software recently released a case study highlighting how our data mining innovations decrease the time our customers spend on protected-data discovery and data breach..

9 Differences Between Data Breach and Litigation Reviews
In a cyber incident response, data must be scanned for Personally Identifiable Information (PII) and Protected Health Information (PHI) to determine if a data breach of protected..

CanopySecure™ Supports The Canopy Project from Earth Day Network
As a company, Canopy Software is dedicated to developing advanced technologies for protected-data discovery and quick notification when one’s PII is breached. One of our core..

Unpacking the Jargon of Data Breach Response
Canopy is the core of a unique process in the ever-growing field of data breach response. A delicate balance of people, process, and technology come together on every project to..

Protect Your Workforce, Company, and Data During the Pandemic
The concept of “telecommuting” is nothing new, and as advancements in technology and Internet bandwidth have grown over the years, the remote workforce has grown tremendously yet..

Challenging Convention: Ediscovery Software Shouldn't Be Used for Data Breach Response
Data privacy regulations are growing in number and complexity, but one thing remains the same through this evolution: the time constraints are severe. That’s just one of the many..

3 Clear Predictions for Data Privacy Technology in 2020
Data privacy regulations are an important rebound to our increasingly digital and connected world, but they are moving targets fraught with complexities and challenging time..

How to Make Your Incident Response Plan
At Legalweek New York 2019, Canopy attended the Beyond The Attack – Legal & Ethical Considerations In Breach Response session. The panel educated us about the interplay between..

4 Ways to Reduce Abnormal Churn After a Data Breach
Abnormal churn, defined as the loss of customers due to a data breach, is on the rise in the United States. According to the 2018 Cost of Data Breach Study by IBM and the Ponemon..