Resource Center

Filtered by:

Featured

Blog

Malware vs. Ransomware: What's th...

While often used these two terms interchangeably, malware vs. ransomware each represent distinct threats to our digit...
Blog

What is the Purpose of a Privacy ...

A Privacy Impact Assessment (PIA) is a vital tool in modern data management, designed to help organizations identify ...
Blog

What is Bruting?: Brute Force Att...

The basic principle behind a brute force attack is straightforward: keep trying different combinations until you find...
Blog

How to Detect and Defend Against ...

Cyber attackers will continue to refine their techniques, making the potential impact of a successful fully undetecta...
Blog

What to Include in a Data Loss Pr...

Aside from data loss being a headache, costing money, causing legal trouble and hurting your company’s reputation, da...

Case studies

CASE STUDY COVER PICTURES (2)
Case study
CASE STUDY Desjardins Industry: Financial services  Region: QC, Canada ...
CASE STUDY COVER PICTURES (3)
Case study
CASE STUDY CAA Club Group Industry: Insurance Region: ON, Canada ...
CASE STUDY COVER PICTURES (1)
Case study
CASE STUDY Énergir Industry: Energy Region: QC, Canada ...

Blogs

crypto malware vs ransomware
Blog
While often used these two terms interchangeably, malware vs. ransomware each represent distinct threats to our digital security. Malware, short for malicious software, is a ...
what is the purpose of a privacy impact assessment
Blog
A Privacy Impact Assessment (PIA) is a vital tool in modern data management, designed to help organizations identify and mitigate potential privacy risks associated with their d...
brute force attack
Blog
The basic principle behind a brute force attack is straightforward: keep trying different combinations until you find the right one. The “bruting” definition is a colloquial ...

Videos

Qohash x KPMG (9)
Videos
Deep expertise meets novel data security technology to offer the fastest path to sensitive data compliance for understaffed teams. Driven by the cybersecurity talent sho...
LinkedIn Live: Microsoft 365 + Qostodian
Videos
Learn how to leverage granular data element technology to stay ahead of risk, speed investigations and simplify compliance reporting. Qohash hosts Dennis Chen, Lead Produ...
LinkedIn Live – A compliance journey banner
Videos
A step-by-step guide to navigating from risk assessment to breach identification This year alone, VA, CO, PA, CT, and UT have new privacy laws coming into effect. These s...

Podcasts

Qohash podcast category visionaries
Podcasts
Our co-founder and CEO, Jean Le Bouthillier, takes the mic with host Brett Stapper, delving deep into the thrilling world of data security in Canada. From military officer to te...

News

qohash qostodian recon logo
News
Qohash is pleased to announce a significant update to the Qostodian Recon scan engine, designed to enhance speed, accuracy, and explainability in data discovery. This latest ver...
Sans titre (3)
News
The AI-powered platform provides visibility and control over files in high-risk data sources, helping enterprises proactively identify risks associated with sensitive data. ...
ISO27001 Certification
News
Qohash, a leading data security posture management company, is pleased to announce that it has recently obtained the prestigious ISO 27001:2022 certification. This certification...

Product

Qostodian Product video banner
Product
In today’s digital age, the protection of sensitive information has become more important than ever. With cyber threats constantly on the rise, individuals and organizatio...
Remediation (1)
Product
In today’s digital landscape, organizations face an ever-increasing need to protect their sensitive information from potential security threats. To address these concerns,...
Qostodian Product video banner
Product
In this instructional video, the Qostodian Recon tool is shown to help find specific information within a file server using the custom sensitive information feature. This featur...
Logo Qohash
By initiative
Regulatory compliance:
Find, classify and inventory all sensitive data, across every data source
Data breach prevention:
Monitor sensitive data 24/7, track data lineage, and enforce policies at endpoints
Microsoft 365
One easy-to-use platform to secure sensitive data on Windows workstations and M365
By regulation
GDPR
CCPA
GLBA
VCDPA
NYCRR
UCPA
PCI-DSS
CPA
Law 25
Why Qohash
Defy legacy limitations
What our customers say about us

Contact us​