Research, analysis, and practitioner perspectives on security behaviour change, incident response, and AI governance.
Latest Articles(50 articles)
Industry
Pharmaceutical Cybersecurity Training: Why Clinical Trial Data Makes Your Workforce a Priority Target
Pharmaceutical organisations face nation-state threats, ransomware against clinical operations, and regulatory expectations that annual compliance training cannot address.
23 April 2026·6 min read
Read →Incident Analysis
Help Desk Vishing: What a Social Engineering Attack Looks Like When It Bypasses MFA
A vishing attack on your IT help desk can reset MFA and open a privileged account in under five minutes, and the attacker never touches your perimeter.
23 April 2026·6 min read
Read →Incident Analysis
Deepfake Voice Fraud: What a £200,000 Wire Transfer Attack Looks Like From Inside Your Finance Team
Deepfake voice fraud is now mature enough to fool trained finance professionals. Here is what the attack sequence looks like and why your current training programme almost certainly does not cover it.
22 April 2026·5 min read
Read →Industry
Insurance Sector Cybersecurity Training: Why Firms Processing Claims Data Are a High-Value Target
Insurers hold health, financial, and legal data on millions of individuals, process it through complex broker networks, and often train their workforce as if the threat profile matched a retail bank.
22 April 2026·5 min read
Read →Research
Spaced Repetition and Security Training: What Interval Research Tells Us About Durable Behaviour Change
The neuroscience of spaced repetition has clear implications for security training design, and most annual compliance programmes do the opposite of what the evidence recommends.
22 April 2026·6 min read
Read →AI Governance
Prompt Injection in Production: Why Your AI Deployment Has an Attack Surface Your Policy Doesn't Cover
Prompt injection turns your AI system's instruction-following capability into an attack vector. Most governance frameworks haven't caught up to what this means in practice.
21 April 2026·6 min read
Read →Research
Role-Based Security Training: What Behaviour Change Data Shows When You Stop Treating Everyone the Same
Generic all-staff training produces generic results. Data from 847 organisations shows that role-targeted incident-triggered training produces measurably different outcomes by job function.
21 April 2026·6 min read
Read →Incident Analysis
Third-Party Data Breach: What Your Organisation Owes When a Supplier Leaks Your Customer Data
When a supplier breach exposes your data, you inherit the incident. Here is what the first 72 hours actually look like and why your team's response training determines the outcome.
21 April 2026·7 min read
Read →Incident Analysis
Account Takeover Incidents: What Credential Stuffing Looks Like When It Hits Your Organisation
Credential stuffing is unglamorous but devastatingly effective: here is what actually happens inside an organisation when automated login attacks succeed.
20 April 2026·6 min read
Read →AI Governance
The EU AI Act and Your Security Stack: What CISOs Need to Know Before Enforcement Begins
The EU AI Act isn't a GDPR sequel, it targets AI systems by risk level and some of the tools in your security stack are already in scope.
20 April 2026·6 min read
Read →Industry
Hospitality and Travel Cybersecurity Training: Why High-Turnover Environments Are an Underestimated Target
Hospitality breaches rarely make headlines, but the sector holds dense personal data, runs on legacy infrastructure, and trains a workforce that largely isn't there six months later.
20 April 2026·6 min read
Read →Incident Analysis
Business Email Compromise: What a Successful Attack Reveals About Training Failure
When a finance team transfers funds to a fraudulent account, the failure rarely started with the wire transfer.
17 April 2026·7 min read
Read →Industry
Legal Sector Cybersecurity Training: Why Law Firms Face a Different Threat Profile Than Their Clients
Law firms hold some of the most sensitive commercial data in existence, yet their security training often lags behind the clients they advise on compliance.
17 April 2026·7 min read
Read →Research
How Quickly Does Security Training Fade? What the Retention Curve Tells Us About Programme Design
Security knowledge decays faster than most training programmes account for, and the timing of reinforcement matters more than the volume of content delivered.
17 April 2026·6 min read
Read →AI Governance
AI Data Sovereignty: Managing Jurisdictional Risk When Models Process Sensitive Data
Every prompt sent to an AI model is a data transfer decision, and most organisations have no policy governing where that data goes.
16 April 2026·6 min read
Read →Incident Analysis
Insider Threat Incidents: What the First 72 Hours Actually Look Like
When the threat comes from inside, the playbook most teams have prepared is almost useless.
16 April 2026·7 min read
Read →Industry
Manufacturing Cybersecurity: Closing the OT-IT Training Gap Before an Incident Does It for You
In manufacturing, a cyber incident does not just delete data. It stops production lines, triggers safety protocols, and puts physical assets at risk.
16 April 2026·7 min read
Read →AI Governance
AI Third-Party Risk: What Happens When Your Vendor's Model Has Your Data
Organisations can now have AI processing sensitive data across dozens of vendor tools they never explicitly approved for AI use, and traditional vendor risk frameworks were not built for this.
15 April 2026·6 min read
Read →Incident Analysis
Cloud Security Incidents: What a Misconfigured Storage Bucket Really Costs You
Most cloud breaches trace back to misconfiguration and human error, not sophisticated attacks, and the organisations that recover fastest are the ones that train at the moment of impact.
15 April 2026·5 min read
Read →Industry
Energy and Utilities Cybersecurity Training: When a Human Error Means the Lights Go Out
In energy and utilities, the gap between IT and OT security culture is not a minor coordination problem; it is the reason incidents escalate from containable to catastrophic.
15 April 2026·6 min read
Read →AI Governance
AI Data Sovereignty: What CISOs Need to Know About Where Your Data Goes When an LLM Processes It
When your staff use a cloud-hosted LLM, that data is processed on infrastructure you do not own, in a jurisdiction you may not have approved. Most organisations have no visibility into this. Many do not yet realise it is a problem.
14 April 2026·6 min read
Read →Industry
Education Sector Cybersecurity Training: Why Universities and Schools Are Harder to Secure Than a Bank
Open networks, constant staff and student turnover, and a culture built around information sharing create a threat environment that standard security training programmes were never designed to address.
14 April 2026·7 min read
Read →Incident Analysis
Insider Threats: What Incident Response Really Looks Like When the Risk Wears a Lanyard
Insider threat incidents expose gaps in incident response that external breach scenarios never test. When the suspect still has an active badge, the playbook is different.
14 April 2026·6 min read
Read →Industry
Government and Public Sector Cybersecurity Training: Meeting NCSC Standards Under Budget Pressure
Public sector organisations face unique cybersecurity training pressures: strict NCSC and Cabinet Office standards, constrained budgets, high staff turnover, and a threat landscape that targets critical national infrastructure.
13 April 2026·7 min read
Read →Industry
Manufacturing Cybersecurity Training: How to Protect a Workforce That Doesn't Think It's a Target
Manufacturing is now one of the most targeted sectors for ransomware, yet most training programmes are built for office workers sitting behind a desk.
13 April 2026·7 min read
Read →Industry
Retail Cybersecurity Training: Why High Staff Turnover Defeats Annual Compliance Programmes
Retail's revolving door workforce means most employees never finish annual training. Here's how incident-triggered learning closes the gap.
13 April 2026·7 min read
Read →Incident Analysis
Ransomware Training After an Attack: Why the First 48 Hours Matter Most
The 48 hours following a ransomware attack represent the highest-impact window for staff training. LimitedView's research across 847 organisations shows why timing is the single most consequential variable in post-incident training effectiveness.
Research
The Neuroscience of Security Training: Why Timing Beats Content
Content quality accounts for far less of security training effectiveness than timing. Neuroscience research explains why the 48-hour window after an incident produces fundamentally different outcomes.
AI Governance
What Is Shadow AI? The Risk Your Organisation Is Ignoring
Shadow AI refers to AI tools used within an organisation without IT or security approval. Here is what it means, why it creates serious risk, and how to detect it before it causes damage.
Incident Analysis
Cybersecurity Training for Financial Services: Meeting FCA and PRA Expectations
FCA and PRA supervisory expectations are shifting cybersecurity training from a compliance checkbox into an operational resilience requirement. Here is what financial services firms need to know.
Research
What Is Incident-Triggered Training? A Complete Guide
Incident-triggered training delivers targeted learning immediately after a real security event. LimitedView's analysis of 847 organisations shows it produces 6× the behaviour change of scheduled programmes — here is how it works and why the difference matters.
Incident Analysis
Incident Response Readiness: How Prepared Is Your Organisation?
Most organisations believe they are prepared for a cyber incident. Most are not. Here is how readiness is assessed, what genuine preparedness looks like, and where the gaps are most commonly found.
AI Governance
Building an AI Governance Framework for the Enterprise
An AI governance framework defines how an organisation controls, monitors, and accounts for AI use across its operations. This guide explains what one contains and how to build it without stalling adoption.
Incident Analysis
Healthcare Cybersecurity Training: Protecting Patient Data Under Pressure
Healthcare organisations face a disproportionate share of ransomware and data theft attacks. The training challenge is not awareness — it is building secure behaviours that hold under the pressures of clinical delivery.
Incident Analysis
Why Traditional Security Awareness Training Doesn't Work
Traditional security awareness training retains just 12% of content at 90 days. LimitedView's analysis of 847 organisations and 650,000+ employees identifies exactly why scheduled programmes fail — and what the data says organisations should do instead.
AI Governance
How AI Is Transforming Cybersecurity Training Delivery
AI is changing cybersecurity training in ways that go beyond personalised content. The most significant application is automating the connection between incident detection and training deployment.
26 March 2026·7 min read
Read →AI Governance
AI Audit Trails: Why Every Request Needs a Record
An AI audit trail is a tamper-evident log of every AI interaction that records what was asked, what the model returned, and what happened next. This article explains why these records are essential for compliance and accountability.
25 March 2026·5 min read
Read →Research
Supply Chain Attacks: How to Train Teams Before the Next SolarWinds
Supply chain attacks compromise organisations through their trusted suppliers and software dependencies. Training teams to recognise, respond to, and contain these threats requires a fundamentally different approach to third-party risk.
Research
Phishing Simulations vs Real Incident Training: Which Changes Behaviour?
Phishing simulations are widely deployed but rarely evaluated against the behaviour change they are supposed to produce. LimitedView's analysis across 847 organisations compares simulation-based and real-incident training on the metrics that actually matter.
AI Governance
Multi-Model AI Strategy: Why Organisations Are Moving Beyond Single Providers
A multi-model AI strategy uses different AI models for different tasks based on capability, cost, and risk profile. This article explains why organisations are adopting this approach and what it takes to manage it well.
18 March 2026·5 min read
Read →Research
Measuring Security Culture: Beyond Phishing Click Rates
Phishing click rates dominate security culture measurement. They measure threat recognition in artificial conditions, not the automatic behaviour patterns that actually determine security outcomes.
16 March 2026·7 min read
Read →Incident Analysis
A CISO's Guide to Measuring Security Training Effectiveness
Most security training is measured by completion rates. LimitedView's analysis of 847 organisations identifies the metrics that actually predict incident reduction — and explains why the numbers most CISOs report are disconnected from operational outcomes.
Incident Analysis
Reporting Cyber Risk to the Board: What CISOs Actually Need
Board-level cyber reporting has improved in form but not always in substance. CISOs who want to drive genuine board engagement on cyber risk need a different approach to what they present and how they present it.
Incident Analysis
The 48-Hour Paradox: Why Your Training Budget Is 87% Wasted
Most organisations spend £47 per employee on security training each year. Our research across 847 organisations shows £41 of that is wasted — because the timing is wrong.
12 March 2026·6 min read
Read →AI Governance
From Policy to Enforcement: Making AI Governance Real
AI policy enforcement is the technical and operational process of ensuring that AI governance rules are applied consistently at runtime, not just documented in policy files. This article explains how to close the gap between written policy and actual practice.
10 March 2026·5 min read
Read →Research
Compliance Training vs Behaviour Change: Why Ticking Boxes Doesn't Reduce Risk
Completion rates tell you who clicked through a module. They do not tell you whether anyone will make a better decision under pressure. The gap between compliance and behaviour change is where most security risk actually lives.
Incident Analysis
The Real Cost of Security Training Failure
Security training failure has a calculable cost. Repeat incidents, regulatory penalties, and remediation overheads combine into a figure that most organisations have never formally modelled.
AI Governance
Why Every AI Request Needs a Policy Decision
Shadow AI is the new shadow IT. Without governance, every AI interaction is an unaudited decision. Here's why policy-first matters.
Research
6× Behaviour Change: The Evidence Behind Incident-Triggered Learning
A deep dive into our research methodology and findings across 847 organisations and 650,000+ employees.
18 February 2026·8 min read
Read →