LimitedView

Insights

Research, analysis, and practitioner perspectives on security behaviour change, incident response, and AI governance.

AI Governance23 April 20266 min read

Foundation Model Risk: What Your Legal and Security Teams Need to Agree On Before You Deploy

Deploying a foundation model from a third-party provider exposes your organisation to supply chain risks that most AI governance frameworks have not caught up with yet.

Read article

Latest Articles(50 articles)

Industry

Pharmaceutical Cybersecurity Training: Why Clinical Trial Data Makes Your Workforce a Priority Target

Pharmaceutical organisations face nation-state threats, ransomware against clinical operations, and regulatory expectations that annual compliance training cannot address.

23 April 2026·6 min read
Read →
Incident Analysis

Help Desk Vishing: What a Social Engineering Attack Looks Like When It Bypasses MFA

A vishing attack on your IT help desk can reset MFA and open a privileged account in under five minutes, and the attacker never touches your perimeter.

23 April 2026·6 min read
Read →
Incident Analysis

Deepfake Voice Fraud: What a £200,000 Wire Transfer Attack Looks Like From Inside Your Finance Team

Deepfake voice fraud is now mature enough to fool trained finance professionals. Here is what the attack sequence looks like and why your current training programme almost certainly does not cover it.

22 April 2026·5 min read
Read →
Industry

Insurance Sector Cybersecurity Training: Why Firms Processing Claims Data Are a High-Value Target

Insurers hold health, financial, and legal data on millions of individuals, process it through complex broker networks, and often train their workforce as if the threat profile matched a retail bank.

22 April 2026·5 min read
Read →
Research

Spaced Repetition and Security Training: What Interval Research Tells Us About Durable Behaviour Change

The neuroscience of spaced repetition has clear implications for security training design, and most annual compliance programmes do the opposite of what the evidence recommends.

22 April 2026·6 min read
Read →
AI Governance

Prompt Injection in Production: Why Your AI Deployment Has an Attack Surface Your Policy Doesn't Cover

Prompt injection turns your AI system's instruction-following capability into an attack vector. Most governance frameworks haven't caught up to what this means in practice.

21 April 2026·6 min read
Read →
Research

Role-Based Security Training: What Behaviour Change Data Shows When You Stop Treating Everyone the Same

Generic all-staff training produces generic results. Data from 847 organisations shows that role-targeted incident-triggered training produces measurably different outcomes by job function.

21 April 2026·6 min read
Read →
Incident Analysis

Third-Party Data Breach: What Your Organisation Owes When a Supplier Leaks Your Customer Data

When a supplier breach exposes your data, you inherit the incident. Here is what the first 72 hours actually look like and why your team's response training determines the outcome.

21 April 2026·7 min read
Read →
Incident Analysis

Account Takeover Incidents: What Credential Stuffing Looks Like When It Hits Your Organisation

Credential stuffing is unglamorous but devastatingly effective: here is what actually happens inside an organisation when automated login attacks succeed.

20 April 2026·6 min read
Read →
AI Governance

The EU AI Act and Your Security Stack: What CISOs Need to Know Before Enforcement Begins

The EU AI Act isn't a GDPR sequel, it targets AI systems by risk level and some of the tools in your security stack are already in scope.

20 April 2026·6 min read
Read →
Industry

Hospitality and Travel Cybersecurity Training: Why High-Turnover Environments Are an Underestimated Target

Hospitality breaches rarely make headlines, but the sector holds dense personal data, runs on legacy infrastructure, and trains a workforce that largely isn't there six months later.

20 April 2026·6 min read
Read →
Incident Analysis

Business Email Compromise: What a Successful Attack Reveals About Training Failure

When a finance team transfers funds to a fraudulent account, the failure rarely started with the wire transfer.

17 April 2026·7 min read
Read →
Industry

Legal Sector Cybersecurity Training: Why Law Firms Face a Different Threat Profile Than Their Clients

Law firms hold some of the most sensitive commercial data in existence, yet their security training often lags behind the clients they advise on compliance.

17 April 2026·7 min read
Read →
Research

How Quickly Does Security Training Fade? What the Retention Curve Tells Us About Programme Design

Security knowledge decays faster than most training programmes account for, and the timing of reinforcement matters more than the volume of content delivered.

17 April 2026·6 min read
Read →
AI Governance

AI Data Sovereignty: Managing Jurisdictional Risk When Models Process Sensitive Data

Every prompt sent to an AI model is a data transfer decision, and most organisations have no policy governing where that data goes.

16 April 2026·6 min read
Read →
Incident Analysis

Insider Threat Incidents: What the First 72 Hours Actually Look Like

When the threat comes from inside, the playbook most teams have prepared is almost useless.

16 April 2026·7 min read
Read →
Industry

Manufacturing Cybersecurity: Closing the OT-IT Training Gap Before an Incident Does It for You

In manufacturing, a cyber incident does not just delete data. It stops production lines, triggers safety protocols, and puts physical assets at risk.

16 April 2026·7 min read
Read →
AI Governance

AI Third-Party Risk: What Happens When Your Vendor's Model Has Your Data

Organisations can now have AI processing sensitive data across dozens of vendor tools they never explicitly approved for AI use, and traditional vendor risk frameworks were not built for this.

15 April 2026·6 min read
Read →
Incident Analysis

Cloud Security Incidents: What a Misconfigured Storage Bucket Really Costs You

Most cloud breaches trace back to misconfiguration and human error, not sophisticated attacks, and the organisations that recover fastest are the ones that train at the moment of impact.

15 April 2026·5 min read
Read →
Industry

Energy and Utilities Cybersecurity Training: When a Human Error Means the Lights Go Out

In energy and utilities, the gap between IT and OT security culture is not a minor coordination problem; it is the reason incidents escalate from containable to catastrophic.

15 April 2026·6 min read
Read →
AI Governance

AI Data Sovereignty: What CISOs Need to Know About Where Your Data Goes When an LLM Processes It

When your staff use a cloud-hosted LLM, that data is processed on infrastructure you do not own, in a jurisdiction you may not have approved. Most organisations have no visibility into this. Many do not yet realise it is a problem.

14 April 2026·6 min read
Read →
Industry

Education Sector Cybersecurity Training: Why Universities and Schools Are Harder to Secure Than a Bank

Open networks, constant staff and student turnover, and a culture built around information sharing create a threat environment that standard security training programmes were never designed to address.

14 April 2026·7 min read
Read →
Incident Analysis

Insider Threats: What Incident Response Really Looks Like When the Risk Wears a Lanyard

Insider threat incidents expose gaps in incident response that external breach scenarios never test. When the suspect still has an active badge, the playbook is different.

14 April 2026·6 min read
Read →
Industry

Government and Public Sector Cybersecurity Training: Meeting NCSC Standards Under Budget Pressure

Public sector organisations face unique cybersecurity training pressures: strict NCSC and Cabinet Office standards, constrained budgets, high staff turnover, and a threat landscape that targets critical national infrastructure.

13 April 2026·7 min read
Read →
Industry

Manufacturing Cybersecurity Training: How to Protect a Workforce That Doesn't Think It's a Target

Manufacturing is now one of the most targeted sectors for ransomware, yet most training programmes are built for office workers sitting behind a desk.

13 April 2026·7 min read
Read →
Industry

Retail Cybersecurity Training: Why High Staff Turnover Defeats Annual Compliance Programmes

Retail's revolving door workforce means most employees never finish annual training. Here's how incident-triggered learning closes the gap.

13 April 2026·7 min read
Read →
Incident Analysis

Ransomware Training After an Attack: Why the First 48 Hours Matter Most

The 48 hours following a ransomware attack represent the highest-impact window for staff training. LimitedView's research across 847 organisations shows why timing is the single most consequential variable in post-incident training effectiveness.

10 April 2026·5 min
Read →
Research

The Neuroscience of Security Training: Why Timing Beats Content

Content quality accounts for far less of security training effectiveness than timing. Neuroscience research explains why the 48-hour window after an incident produces fundamentally different outcomes.

9 April 2026·7 min read
Read →
AI Governance

What Is Shadow AI? The Risk Your Organisation Is Ignoring

Shadow AI refers to AI tools used within an organisation without IT or security approval. Here is what it means, why it creates serious risk, and how to detect it before it causes damage.

8 April 2026·5 min read
Read →
Incident Analysis

Cybersecurity Training for Financial Services: Meeting FCA and PRA Expectations

FCA and PRA supervisory expectations are shifting cybersecurity training from a compliance checkbox into an operational resilience requirement. Here is what financial services firms need to know.

7 April 2026·5
Read →
Research

What Is Incident-Triggered Training? A Complete Guide

Incident-triggered training delivers targeted learning immediately after a real security event. LimitedView's analysis of 847 organisations shows it produces 6× the behaviour change of scheduled programmes — here is how it works and why the difference matters.

5 April 2026·5 min
Read →
Incident Analysis

Incident Response Readiness: How Prepared Is Your Organisation?

Most organisations believe they are prepared for a cyber incident. Most are not. Here is how readiness is assessed, what genuine preparedness looks like, and where the gaps are most commonly found.

3 April 2026·7 min read
Read →
AI Governance

Building an AI Governance Framework for the Enterprise

An AI governance framework defines how an organisation controls, monitors, and accounts for AI use across its operations. This guide explains what one contains and how to build it without stalling adoption.

1 April 2026·5 min read
Read →
Incident Analysis

Healthcare Cybersecurity Training: Protecting Patient Data Under Pressure

Healthcare organisations face a disproportionate share of ransomware and data theft attacks. The training challenge is not awareness — it is building secure behaviours that hold under the pressures of clinical delivery.

30 March 2026·5
Read →
Incident Analysis

Why Traditional Security Awareness Training Doesn't Work

Traditional security awareness training retains just 12% of content at 90 days. LimitedView's analysis of 847 organisations and 650,000+ employees identifies exactly why scheduled programmes fail — and what the data says organisations should do instead.

28 March 2026·5 min
Read →
AI Governance

How AI Is Transforming Cybersecurity Training Delivery

AI is changing cybersecurity training in ways that go beyond personalised content. The most significant application is automating the connection between incident detection and training deployment.

26 March 2026·7 min read
Read →
AI Governance

AI Audit Trails: Why Every Request Needs a Record

An AI audit trail is a tamper-evident log of every AI interaction that records what was asked, what the model returned, and what happened next. This article explains why these records are essential for compliance and accountability.

25 March 2026·5 min read
Read →
Research

Supply Chain Attacks: How to Train Teams Before the Next SolarWinds

Supply chain attacks compromise organisations through their trusted suppliers and software dependencies. Training teams to recognise, respond to, and contain these threats requires a fundamentally different approach to third-party risk.

22 March 2026·5
Read →
Research

Phishing Simulations vs Real Incident Training: Which Changes Behaviour?

Phishing simulations are widely deployed but rarely evaluated against the behaviour change they are supposed to produce. LimitedView's analysis across 847 organisations compares simulation-based and real-incident training on the metrics that actually matter.

20 March 2026·5 min
Read →
AI Governance

Multi-Model AI Strategy: Why Organisations Are Moving Beyond Single Providers

A multi-model AI strategy uses different AI models for different tasks based on capability, cost, and risk profile. This article explains why organisations are adopting this approach and what it takes to manage it well.

18 March 2026·5 min read
Read →
Research

Measuring Security Culture: Beyond Phishing Click Rates

Phishing click rates dominate security culture measurement. They measure threat recognition in artificial conditions, not the automatic behaviour patterns that actually determine security outcomes.

16 March 2026·7 min read
Read →
Incident Analysis

A CISO's Guide to Measuring Security Training Effectiveness

Most security training is measured by completion rates. LimitedView's analysis of 847 organisations identifies the metrics that actually predict incident reduction — and explains why the numbers most CISOs report are disconnected from operational outcomes.

15 March 2026·5 min
Read →
Incident Analysis

Reporting Cyber Risk to the Board: What CISOs Actually Need

Board-level cyber reporting has improved in form but not always in substance. CISOs who want to drive genuine board engagement on cyber risk need a different approach to what they present and how they present it.

14 March 2026·5
Read →
Incident Analysis

The 48-Hour Paradox: Why Your Training Budget Is 87% Wasted

Most organisations spend £47 per employee on security training each year. Our research across 847 organisations shows £41 of that is wasted — because the timing is wrong.

12 March 2026·6 min read
Read →
AI Governance

From Policy to Enforcement: Making AI Governance Real

AI policy enforcement is the technical and operational process of ensuring that AI governance rules are applied consistently at runtime, not just documented in policy files. This article explains how to close the gap between written policy and actual practice.

10 March 2026·5 min read
Read →
Research

Compliance Training vs Behaviour Change: Why Ticking Boxes Doesn't Reduce Risk

Completion rates tell you who clicked through a module. They do not tell you whether anyone will make a better decision under pressure. The gap between compliance and behaviour change is where most security risk actually lives.

8 March 2026·5
Read →
Incident Analysis

The Real Cost of Security Training Failure

Security training failure has a calculable cost. Repeat incidents, regulatory penalties, and remediation overheads combine into a figure that most organisations have never formally modelled.

6 March 2026·7 min read
Read →
AI Governance

Why Every AI Request Needs a Policy Decision

Shadow AI is the new shadow IT. Without governance, every AI interaction is an unaudited decision. Here's why policy-first matters.

4 March 2026·5 min read
Read →
Research

6× Behaviour Change: The Evidence Behind Incident-Triggered Learning

A deep dive into our research methodology and findings across 847 organisations and 650,000+ employees.

18 February 2026·8 min read
Read →