Co-founder and CEO of Nudge Security, Russell has over 15 years of experience building products and startup companies that secure organizations worldwide. Most recently, Russell served as VP of Products and Strategy at AT&T Cybersecurity, one of the world’s top-five largest managed security service providers (MSSPs).
Prior to acquisition by AT&T, Russell led products at AlienVault where he drove mass market adoption of full-stack threat detection and response solutions. He was a co-founder of the Open Threat Exchange, the world’s largest open threat intelligence community with over 180,000 global participants today.
Earlier in his career, Russell led products at Fortify Software, a company that established the now $12.9 billion application security market and dominated the leadership quadrant of the Gartner MQ for 11 straight years.
Eight steps to ensure complete employee offboarding for SaaS and cloud accounts, including the OAuth grants, resources, and passwords you’re most likely forgetting.
Read more
Eight steps to ensure complete employee offboarding for SaaS and cloud accounts, including the OAuth grants, resources, and passwords you’re most likely forgetting.
Read more
What does the rapid pace of AI adoption mean for cybersecurity leaders as they grapple with AI security and governance?
Read more
What does the rapid pace of AI adoption mean for cybersecurity leaders as they grapple with AI security and governance?
Read more
How SSPM solutions help automate the detection, remediation, and reporting of configuration issues, identity risks, and other SaaS security threats.
Read more
How SSPM solutions help automate the detection, remediation, and reporting of configuration issues, identity risks, and other SaaS security threats.
Read more
Why the classic physics challenge might feel familiar to those operating within the “shared security model” for SaaS applications.
Read more
Why the classic physics challenge might feel familiar to those operating within the “shared security model” for SaaS applications.
Read more
How to streamline all aspects of your SaaS data governance process, ensuring that technology is onboarded, managed, and secured properly.
Read more
How to streamline all aspects of your SaaS data governance process, ensuring that technology is onboarded, managed, and secured properly.
Read more
From our sales team to our engineers, everyone at Nudge shares the responsibility for providing a positive experience.
Read more
From our sales team to our engineers, everyone at Nudge shares the responsibility for providing a positive experience.
Read more
Non-human identities have increased our attack surface—and with it, the management headache that defines the modern stack of business technology.
Read more
Non-human identities have increased our attack surface—and with it, the management headache that defines the modern stack of business technology.
Read more
Shadow IT risks present a formidable challenge to modern businesses. Learn to identify shadow IT risks and regain control of your security posture.
Read more
Shadow IT risks present a formidable challenge to modern businesses. Learn to identify shadow IT risks and regain control of your security posture.
Read more
With the rise in threat campaigns targeting SaaS instances, we need a shared responsibility model that includes employees as well as IT security teams.
Read more
With the rise in threat campaigns targeting SaaS instances, we need a shared responsibility model that includes employees as well as IT security teams.
Read more
How to streamline IAM, starting with a complete inventory of every and SaaS app that’s been introduced into your organization.
Read more
How to streamline IAM, starting with a complete inventory of every and SaaS app that’s been introduced into your organization.
Read more
A look back at the highlights, themes, and insights from Nudge Security’s “Overshadowed” interview series.
Read more
A look back at the highlights, themes, and insights from Nudge Security’s “Overshadowed” interview series.
Read more
How to discover and categorize cloud and SaaS assets in scope of SOC 2 while automating access reviews in order to stay compliant.
Read more
How to discover and categorize cloud and SaaS assets in scope of SOC 2 while automating access reviews in order to stay compliant.
Read more
How to map your SaaS supply chain automatically, so you can quickly determine if a third- or fourth-party breach puts you at risk.
Read more
How to map your SaaS supply chain automatically, so you can quickly determine if a third- or fourth-party breach puts you at risk.
Read more
While 2024 will undoubtedly throw some curveballs, one sure bet is that modern work will continue to happen across cloud and SaaS applications.
Read more
While 2024 will undoubtedly throw some curveballs, one sure bet is that modern work will continue to happen across cloud and SaaS applications.
Read more
Why comprehensive shadow IT discovery is an essential first step toward securing an organization's SaaS estate.
Read more
Why comprehensive shadow IT discovery is an essential first step toward securing an organization's SaaS estate.
Read more
Managing a sprawling web of OAuth grants is an unmanaged risk most organizations are just beginning to understand. Here’s how we can help.
Read more
Managing a sprawling web of OAuth grants is an unmanaged risk most organizations are just beginning to understand. Here’s how we can help.
Read more
Instead of harping on awareness, it's time to implement repeatable, real-world practice that ingrains positive habits and security behaviors.
Read more
Instead of harping on awareness, it's time to implement repeatable, real-world practice that ingrains positive habits and security behaviors.
Read more
How dark patterns in the go-to-market strategies of B2B SaaS companies are designed to work against IT and security—and what you can do about it.
Read more
How dark patterns in the go-to-market strategies of B2B SaaS companies are designed to work against IT and security—and what you can do about it.
Read more
When offboarding users, don't let their their lingering OAuth grants don’t come back to haunt you.
Read more
When offboarding users, don't let their their lingering OAuth grants don’t come back to haunt you.
Read more
Why effective vendor risk management is a critical strategy for identifying, assessing, and mitigating risks within the SaaS supply chain.
Read more
Why effective vendor risk management is a critical strategy for identifying, assessing, and mitigating risks within the SaaS supply chain.
Read more
Why modern data governance requires a full inventory of SaaS apps and accounts in use at your organization.
Read more
Why modern data governance requires a full inventory of SaaS apps and accounts in use at your organization.
Read more
Why IT and security leaders need a new approach to securing and governing access to new cloud-delivered technologies.
Read more
Why IT and security leaders need a new approach to securing and governing access to new cloud-delivered technologies.
Read more
Thus far, IT automation has failed to address the hardest parts of employee offboarding. Here’s what IT and operations professionals need to know.
Read more
Thus far, IT automation has failed to address the hardest parts of employee offboarding. Here’s what IT and operations professionals need to know.
Read more
The new management problem organizations must solve is safeguarding the modern mesh of SaaS and cloud accounts.
Read more
The new management problem organizations must solve is safeguarding the modern mesh of SaaS and cloud accounts.
Read more
While SSO helps to streamline employee onboarding and offboarding efforts, it’s only one piece of the SaaS identity and access puzzle.
Read more
While SSO helps to streamline employee onboarding and offboarding efforts, it’s only one piece of the SaaS identity and access puzzle.
Read more
Why applying the concepts of zero trust broadly to employees is a dangerous mistake for cybersecurity programs.
Read more
Why applying the concepts of zero trust broadly to employees is a dangerous mistake for cybersecurity programs.
Read more
Shadow IT is no longer a problem to solve—it’s a reality of modern work that must be accepted and redirected.
Read more
Shadow IT is no longer a problem to solve—it’s a reality of modern work that must be accepted and redirected.
Read more
Network monitoring and expense report analysis simply don’t work. The perfect side-channel attack on Shadow IT? Your inbox.
Read more
Network monitoring and expense report analysis simply don’t work. The perfect side-channel attack on Shadow IT? Your inbox.
Read more
CISOs used to be advised to “think like a hacker.” Now, facing mounting risks associated with SaaS sprawl and shadow IT, CISOs must learn to think like SaaS entrepreneurs.
Read more
CISOs used to be advised to “think like a hacker.” Now, facing mounting risks associated with SaaS sprawl and shadow IT, CISOs must learn to think like SaaS entrepreneurs.
Read more
Our guide to adjusting vendor security assessments to match the pace and complexity of modern work.
Read more
Our guide to adjusting vendor security assessments to match the pace and complexity of modern work.
Read more
Single sign-on is a qualifying condition for any modern product—not a premium feature that warrants a price bump.
Read more
Single sign-on is a qualifying condition for any modern product—not a premium feature that warrants a price bump.
Read more
For a clear picture of supply chain risk, the real bill of materials we need is the cumulative set of integrated software, SaaS, PaaS, and IaaS.
Read more
For a clear picture of supply chain risk, the real bill of materials we need is the cumulative set of integrated software, SaaS, PaaS, and IaaS.
Read more
Recent data breaches at Signal, Twilio, MailChimp, and others underscore the imperative of securing the SaaS supply chain.
Read more
Recent data breaches at Signal, Twilio, MailChimp, and others underscore the imperative of securing the SaaS supply chain.
Read more
As workers prioritize flexible work and learning opportunities, organizational leaders must focus on creating a positive employee experience.
Read more
As workers prioritize flexible work and learning opportunities, organizational leaders must focus on creating a positive employee experience.
Read more
When data breaches make headlines, it’s often difficult to know whether or not your organization sits in the blast radius.
Read more
When data breaches make headlines, it’s often difficult to know whether or not your organization sits in the blast radius.
Read more