VP of growth marketing at Nudge Security, Emily has led demand generation and broader marketing functions for IT and security start-ups for over 15 years. She enjoys translating product features into compelling customer benefits and finding new and novel ways to engage technical buyers. After starting her career as a chemical engineer, she joined an e-commerce start-up in the oil and gas industry and has worked for technology companies ever since.

The enterprise AI attack surface has expanded fast. Here's how the leading AI security platforms compare across discovery, runtime protection, and model security—with pricing and honest analysis.
Read more

The enterprise AI attack surface has expanded fast. Here's how the leading AI security platforms compare across discovery, runtime protection, and model security—with pricing and honest analysis.
Read more

The browser is where most enterprise work happens—but it's not the full picture. Here's how the leading browser security platforms compare, and what they can't see.
Read more

The browser is where most enterprise work happens—but it's not the full picture. Here's how the leading browser security platforms compare, and what they can't see.
Read more

CASB as a standalone proxy product is giving way to SSE platforms and identity-first governance. Here's how the leading solutions compare—and which architectural approach fits your environment.
Read more

CASB as a standalone proxy product is giving way to SSE platforms and identity-first governance. Here's how the leading solutions compare—and which architectural approach fits your environment.
Read more

SaaS estates have outgrown spreadsheet tracking. Here's how the leading SaaS management platforms compare across discovery, lifecycle automation, security posture, and spend visibility.
Read more

SaaS estates have outgrown spreadsheet tracking. Here's how the leading SaaS management platforms compare across discovery, lifecycle automation, security posture, and spend visibility.
Read more

Shadow IT has become shadow everything—SaaS, AI, and autonomous agents. Here's how the leading platforms compare on discovery method, coverage, and governance so you can close the gap.
Read more

Shadow IT has become shadow everything—SaaS, AI, and autonomous agents. Here's how the leading platforms compare on discovery method, coverage, and governance so you can close the gap.
Read more

Misconfigurations, excessive permissions, and shadow SaaS are the most common sources of SaaS security risk. Here's how the leading SSPM platforms compare on discovery, posture, and remediation.
Read more

Misconfigurations, excessive permissions, and shadow SaaS are the most common sources of SaaS security risk. Here's how the leading SSPM platforms compare on discovery, posture, and remediation.
Read more

Five ways Nudge Security helps you gain the visibility you need, secure your newly expanded SaaS estate, and plan for the future.
Read more

Five ways Nudge Security helps you gain the visibility you need, secure your newly expanded SaaS estate, and plan for the future.
Read more

Nudge Security is the only SaaS management platform that discovers up to two years of historical SaaS spend within minutes of starting a free trial.
Read more

Nudge Security is the only SaaS management platform that discovers up to two years of historical SaaS spend within minutes of starting a free trial.
Read more

With AI making it’s way into virtually every SaaS application, AI discovery extends far beyond chat prompts and purpose-built AI tools.
Read more

With AI making it’s way into virtually every SaaS application, AI discovery extends far beyond chat prompts and purpose-built AI tools.
Read more

Why SaaS security should be a core element of your IT security and governance program.
Read more

Why SaaS security should be a core element of your IT security and governance program.
Read more

Make smart, data-driven SaaS investment decisions that drive the business forward while reducing risk and waste.
Read more

Make smart, data-driven SaaS investment decisions that drive the business forward while reducing risk and waste.
Read more

A guide to winning friends and influence during your first 90 days in an InfoSec leadership role
Read more

A guide to winning friends and influence during your first 90 days in an InfoSec leadership role
Read more

From unused SaaS accounts to rogue developer accounts and redundant productivity tools, Nudge Security can help you identify quick and substantial cost-savings.
Read more

From unused SaaS accounts to rogue developer accounts and redundant productivity tools, Nudge Security can help you identify quick and substantial cost-savings.
Read more
