Cybersecurity Known Vulnerabilities are voluntarily reported into the Common Vulnerability and Exposure Database. This is a voluntary database and thus not all software or hardware vendors report into it. A few software or hardware vendors contact license holders directly. Only 51% are known, this leaves 49% undetectable and a golden opportunity for hackers to bypass existing Cybersecurity threat detection appliances. We know this because there have been several Honey Pot projects that have conducted threat intelligence gathering activities. This video is 1 of 100 that I will be publishing to help explain and guide professionals who are seeking Cybersecurity leadership roles. Please like and share if you find this knowledge useful and consider following me and registering on my website, (www.bernard-institute.com), for additional courses and knowledge sharing.