Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

5/21/2019
01:30 PM
100%
0%

KnowBe4 Focuses on Security Culture with CLTRe Acquisition

The acquisition solidifies KnowBe4's European presence and shows a focus on building and measuring security culture.

KnowBe4 today confirmed its acquisition of CLTRe, a Norwegian company that specializes in helping organizations build, assess, maintain, and measure a stronger cybersecurity culture.

CLTRe (pronounced "culture"), was founded in 2015 and is headquartered in Oslo, Norway. Its Security Culture Framework and CLTRe Toolkit were developed to help businesses collect evidence about their security culture and how it changes over time. Its platform aims to help drive security culture and awareness training programs with assessments, external and internal benchmarking, and reports and insights to demonstrate how culture improves over time.

The deal shows that KnowBe4, a platform for awareness training and simulated phishing, is taking a closer look at culture. A "Cybersecurity Culture Report" from ISACA and CMMI Institute found 95% of security respondents see a gap between current and desired security culture. With most malware delivered via email, it sees an opportunity to work with employees and lessen risk.

CLTRe will continue to operate as an independent subsidiary under KnowBe4 and service customers around the world. Its CLTRe Toolkit and Security Culture Framework will be made available to KnowBe4 customers later this year, and CLTRe clients will have access to KnowBe4's platform for cybersecurity awareness training and simulated phishing.

Terms of the deal were not disclosed. CLTRe has generated a total of €50,000K in funding.

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Microsoft Patches Wormable RCE Vulns in Remote Desktop Services
Kelly Sheridan, Staff Editor, Dark Reading,  8/13/2019
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
GitHub Named in Capital One Breach Lawsuit
Dark Reading Staff 8/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-0173
PUBLISHED: 2019-08-19
Authentication bypass in the web console for Intel(R) Raid Web Console 2 all versions may allow an unauthenticated attacker to potentially enable disclosure of information via network access.
CVE-2019-11140
PUBLISHED: 2019-08-19
Insufficient session validation in system firmware for Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.
CVE-2019-11143
PUBLISHED: 2019-08-19
Improper permissions in the software installer for Intel(R) Authenticate before 3.8 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2019-11145
PUBLISHED: 2019-08-19
Improper file verification in Intel? Driver & Support Assistant before 19.7.30.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2019-11146
PUBLISHED: 2019-08-19
Improper file verification in Intel? Driver & Support Assistant before 19.7.30.2 may allow an authenticated user to potentially enable escalation of privilege via local access.