IRVINE, Calif.--(BUSINESS WIRE)--Cylance®, the company that is revolutionizing cybersecurity through the use of artificial intelligence to proactively prevent advanced persistent threats and malware, announced the joint release of the first-annual 2017 TAG Cyber Security Annual -- Practical Handbook and Reference Guide for the Working Cyber Security Professional. Cylance is part of an industry collective of 48 of the nation’s foremost cyber security vendors participating in the report, which was published by The Amoroso Group (TAG Cyber) following in-depth industry research and analysis.

"We’re very pleased to be part of the TAG Cyber initiative," said Stuart McClure, CEO of Cylance. "The preventive, artificial intelligence-based CylancePROTECT® product we offer customers will be an important component of any redesign of enterprise security architectures."

The report details a new urgency for how America’s commercial, financial and utility sectors respond to escalating and increasingly complex cyber attacks. It includes a comprehensive analysis of the cyber security industry with specific insights from C-level executives and thought leaders. Dr. Edward G. Amoroso, former chief security officer of AT&T and author of six books on cyber security, spearheaded writing and researching the report.

"I am so grateful to the entire Cylance team, and in particular their fine CEO, Stuart McClure, for all the great contributions to the cyber security industry and for their support of this research," said Ed Amoroso.

The 2017 TAG Cyber Security Annual has been written for information security and technology professionals in all industries with a special focus on U.S. infrastructure companies, including energy, telecommunications, manufacturing, health care and utilities. The report will be available at no cost to all users as a free download on the Cylance website and TAG Cyber’s website.

The handbook is centered around a revolutionary new approach to cyber security that calls on tech leaders of the largest and most important American enterprises to explode existing infrastructure to disperse data across multiple platforms, offload sensitive information into secure cloud-based solutions and reload systems, policies and personnel to better position them to effectively defend against cyber attacks that are not only likely, but occurring at an increasing rate.

It includes three volumes:

Volume 1: TAG Cyber Security Fifty Controls details the fifty primary control areas required for CISO teams to be effective in this new era of cybersecurity. These areas include traditional controls such as firewall platforms and two-factor authentication along with non-traditional controls such as security recruiting and security R&D. For each control area, an extensive list of supporting vendors is included to help jumpstart local source selection.

details the fifty primary control areas required for CISO teams to be effective in this new era of cybersecurity. These areas include traditional controls such as firewall platforms and two-factor authentication along with non-traditional controls such as security recruiting and security R&D. For each control area, an extensive list of supporting vendors is included to help jumpstart local source selection. Volume 2: Interviews with Distinguished Vendor Principals includes in-depth conversations with the thought leaders and distinguished vendor principals. It offers a brief digest of the expert guidance and cyber security insights offered by these industry authorities during the research stages of this report.

includes in-depth conversations with the thought leaders and distinguished vendor principals. It offers a brief digest of the expert guidance and cyber security insights offered by these industry authorities during the research stages of this report. Volume 3: TAG Cyber Security Vendor Listings serves as a reference guide to the cyber security industry. This comprehensive review includes nearly 1,400 vendors this year, with an additional 500 vendors to be incorporated into the 2018 report.

About TAG Cyber, LLC

The Amoroso Group (TAG Cyber) is a global cyber security advisory, training, consulting and media services company. Led by Edward Amoroso, industry veteran and former chief security officer for AT&T, TAG Cyber supports hundreds of companies around the world by providing a roadmap for identifying, preventing and eliminating cyber attacks on their systems and data.

About Cylance Inc.

Cylance is the first company to successfully apply artificial intelligence, algorithmic science and machine learning to cybersecurity and improve the way companies, governments and end users proactively solve the world’s most difficult security problems. Using a breakthrough mathematical process, Cylance quickly and accurately identifies what is safe and what is a threat, expanding beyond what is in a blacklist or whitelist. By coupling sophisticated math and machine learning with a unique understanding of a hacker’s mentality, Cylance provides the technology and services that are predictive and preventive against advanced threats. For more information, visit: www.cylance.com.

Cylance and CylancePROTECT are registered trademarks or trademarks owned by Cylance Inc. in the United States and other jurisdictions and may not be used without prior written permission. All other trademarks are the property of their respective owners.

For More Information

Cylance press releases and news

Cylance events and Unbelievable Tour dates

Social Networks:

Website: www.cylance.com

Blog: blog.cylance.com

Twitter: www.twitter.com/cylanceinc

LinkedIn: http://www.linkedin.com/company/cylanceinc

YouTube: www.youtube.com/cylanceinc