Like open locks on a safe, cyber vulnerabilities are weaknesses across people, process and technology (such as misconfigurations, broken process, human error, and technical weaknesses like buffer overflow in a system, network, application or asset) that can be exploited by cybercriminals. After leveraging a vulnerability to gain unauthorized access into…