Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

5/21/2019
01:30 PM
100%
0%

KnowBe4 Focuses on Security Culture with CLTRe Acquisition

The acquisition solidifies KnowBe4's European presence and shows a focus on building and measuring security culture.

KnowBe4 today confirmed its acquisition of CLTRe, a Norwegian company that specializes in helping organizations build, assess, maintain, and measure a stronger cybersecurity culture.

CLTRe (pronounced "culture"), was founded in 2015 and is headquartered in Oslo, Norway. Its Security Culture Framework and CLTRe Toolkit were developed to help businesses collect evidence about their security culture and how it changes over time. Its platform aims to help drive security culture and awareness training programs with assessments, external and internal benchmarking, and reports and insights to demonstrate how culture improves over time.

The deal shows that KnowBe4, a platform for awareness training and simulated phishing, is taking a closer look at culture. A "Cybersecurity Culture Report" from ISACA and CMMI Institute found 95% of security respondents see a gap between current and desired security culture. With most malware delivered via email, it sees an opportunity to work with employees and lessen risk.

CLTRe will continue to operate as an independent subsidiary under KnowBe4 and service customers around the world. Its CLTRe Toolkit and Security Culture Framework will be made available to KnowBe4 customers later this year, and CLTRe clients will have access to KnowBe4's platform for cybersecurity awareness training and simulated phishing.

Terms of the deal were not disclosed. CLTRe has generated a total of €50,000K in funding.

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
For Cybersecurity to Be Proactive, Terrains Must Be Mapped
Craig Harber, Chief Technology Officer at Fidelis Cybersecurity,  10/8/2019
How to Think Like a Hacker
Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10759
PUBLISHED: 2019-10-15
safer-eval before 1.3.4 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
CVE-2019-10760
PUBLISHED: 2019-10-15
safer-eval before 1.3.2 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
CVE-2019-17397
PUBLISHED: 2019-10-15
In the DoorDash application through 11.5.2 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.
CVE-2019-12944
PUBLISHED: 2019-10-15
Glue Smart Lock 2.7.8 devices do not properly block guest access in certain situations where the network connection is unavailable.
CVE-2019-17195
PUBLISHED: 2019-10-15
Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass.