Co-Founder and CEO of Nudge Security, Russell has over 15 years of experience building products and startup companies that secure organizations worldwide. Most recently, Russell served as VP of Products and Strategy at AT&T Cybersecurity, one of the world’s top-five largest managed security service providers (MSSPs).
Prior to acquisition by AT&T, Russell led products at AlienVault where he drove mass market adoption of full-stack threat detection and response solutions. He was a co-founder of the Open Threat Exchange, the world’s largest open threat intelligence community with over 180,000 global participants today.
Earlier in his career, Russell led products at Fortify Software, a company that established the now $12.9 billion application security market and dominated the leadership quadrant of the Gartner MQ for 11 straight years.
Thus far, IT automation has failed to address the hardest parts of employee offboarding. Here’s what IT and operations professionals need to know.
Read more
Thus far, IT automation has failed to address the hardest parts of employee offboarding. Here’s what IT and operations professionals need to know.
Read more
The new management problem organizations must solve is safeguarding the modern mesh of SaaS and cloud accounts.
Read more
The new management problem organizations must solve is safeguarding the modern mesh of SaaS and cloud accounts.
Read more
While SSO helps to streamline employee onboarding and offboarding efforts, it’s only one piece of the SaaS identity and access puzzle.
Read more
While SSO helps to streamline employee onboarding and offboarding efforts, it’s only one piece of the SaaS identity and access puzzle.
Read more
Why applying the concepts of zero trust broadly to employees is a dangerous mistake for cybersecurity programs.
Read more
Why applying the concepts of zero trust broadly to employees is a dangerous mistake for cybersecurity programs.
Read more
Shadow IT is no longer a problem to solve—it’s a reality of modern work that must be accepted and redirected.
Read more
Shadow IT is no longer a problem to solve—it’s a reality of modern work that must be accepted and redirected.
Read more
Network monitoring and expense report analysis simply don’t work. The perfect side-channel attack on Shadow IT? Your inbox.
Read more
Network monitoring and expense report analysis simply don’t work. The perfect side-channel attack on Shadow IT? Your inbox.
Read more
CISOs used to be advised to “think like a hacker.” Now, facing mounting risks associated with SaaS sprawl and shadow IT, CISOs must learn to think like SaaS entrepreneurs.
Read more
CISOs used to be advised to “think like a hacker.” Now, facing mounting risks associated with SaaS sprawl and shadow IT, CISOs must learn to think like SaaS entrepreneurs.
Read more
Our guide to adjusting vendor security assessments to match the pace and complexity of modern work.
Read more
Our guide to adjusting vendor security assessments to match the pace and complexity of modern work.
Read more
Single sign-on is a qualifying condition for any modern product—not a premium feature that warrants a price bump.
Read more
Single sign-on is a qualifying condition for any modern product—not a premium feature that warrants a price bump.
Read more
For a clear picture of supply chain risk, the real bill of materials we need is the cumulative set of integrated software, SaaS, PaaS, and IaaS.
Read more
For a clear picture of supply chain risk, the real bill of materials we need is the cumulative set of integrated software, SaaS, PaaS, and IaaS.
Read more
Recent data breaches at Signal, Twilio, MailChimp, and others underscore the imperative of securing the SaaS supply chain.
Read more
Recent data breaches at Signal, Twilio, MailChimp, and others underscore the imperative of securing the SaaS supply chain.
Read more
As workers prioritize flexible work and learning opportunities, organizational leaders must focus on creating a positive employee experience.
Read more
As workers prioritize flexible work and learning opportunities, organizational leaders must focus on creating a positive employee experience.
Read more
When data breaches make headlines, it’s often difficult to know whether or not your organization sits in the blast radius.
Read more
When data breaches make headlines, it’s often difficult to know whether or not your organization sits in the blast radius.
Read more