Co-founder and CEO of Nudge Security, Russell has over 15 years of experience building products and startup companies that secure organizations worldwide. Most recently, Russell served as VP of Products and Strategy at AT&T Cybersecurity, one of the world’s top-five largest managed security service providers (MSSPs).
Prior to acquisition by AT&T, Russell led products at AlienVault where he drove mass market adoption of full-stack threat detection and response solutions. He was a co-founder of the Open Threat Exchange, the world’s largest open threat intelligence community with over 180,000 global participants today.
Earlier in his career, Russell led products at Fortify Software, a company that established the now $12.9 billion application security market and dominated the leadership quadrant of the Gartner MQ for 11 straight years.

What does the rapid pace of AI adoption mean for cybersecurity leaders as they grapple with AI security and governance?
Read more

What does the rapid pace of AI adoption mean for cybersecurity leaders as they grapple with AI security and governance?
Read more

AI is no longer limited to prompts and file uploads. With MCP and embedded AI in SaaS apps, corporate data exposure is accelerating. Learn what this means for security and governance.
Read more

AI is no longer limited to prompts and file uploads. With MCP and embedded AI in SaaS apps, corporate data exposure is accelerating. Learn what this means for security and governance.
Read more

Why effective vendor risk management is a critical strategy for identifying, assessing, and mitigating risks within the SaaS supply chain.
Read more

Why effective vendor risk management is a critical strategy for identifying, assessing, and mitigating risks within the SaaS supply chain.
Read more

Why comprehensive shadow IT discovery is an essential first step toward securing an organization's SaaS estate.
Read more

Why comprehensive shadow IT discovery is an essential first step toward securing an organization's SaaS estate.
Read more

Shadow IT risks present a formidable challenge to modern businesses. Learn to identify shadow IT risks and regain control of your security posture.
Read more

Shadow IT risks present a formidable challenge to modern businesses. Learn to identify shadow IT risks and regain control of your security posture.
Read more

How to streamline IAM, starting with a complete inventory of every and SaaS app that’s been introduced into your organization.
Read more

How to streamline IAM, starting with a complete inventory of every and SaaS app that’s been introduced into your organization.
Read more

SaaS security isn't just another cybersecurity trend—it's a fundamental recognition that the traditional security paradigm is failing to address modern threats.
Read more

SaaS security isn't just another cybersecurity trend—it's a fundamental recognition that the traditional security paradigm is failing to address modern threats.
Read more

In today's world of distributed workforces and rapid SaaS adoption, organizations need a new approach to technology governance—one that empowers employees while maintaining security.
Read more

In today's world of distributed workforces and rapid SaaS adoption, organizations need a new approach to technology governance—one that empowers employees while maintaining security.
Read more

How SSPM solutions help automate the detection, remediation, and reporting of configuration issues, identity risks, and other SaaS security threats.
Read more

How SSPM solutions help automate the detection, remediation, and reporting of configuration issues, identity risks, and other SaaS security threats.
Read more

Nudge Security CEO Russell Spitler explores the possibility of an AI-fueled cyberattack in this OpEd published in The Information.
Read more

Nudge Security CEO Russell Spitler explores the possibility of an AI-fueled cyberattack in this OpEd published in The Information.
Read more

Thus far, IT automation has failed to address the hardest parts of employee offboarding. Here’s what IT and operations professionals need to know.
Read more

Thus far, IT automation has failed to address the hardest parts of employee offboarding. Here’s what IT and operations professionals need to know.
Read more

How to map your SaaS supply chain automatically, so you can quickly determine if a third- or fourth-party breach puts you at risk.
Read more

How to map your SaaS supply chain automatically, so you can quickly determine if a third- or fourth-party breach puts you at risk.
Read more

Eight steps to ensure complete employee offboarding for SaaS and cloud accounts, including the OAuth grants, resources, and passwords you’re most likely forgetting.
Read more

Eight steps to ensure complete employee offboarding for SaaS and cloud accounts, including the OAuth grants, resources, and passwords you’re most likely forgetting.
Read more

Why the classic physics challenge might feel familiar to those operating within the “shared security model” for SaaS applications.
Read more

Why the classic physics challenge might feel familiar to those operating within the “shared security model” for SaaS applications.
Read more

From our sales team to our engineers, everyone at Nudge shares the responsibility for providing a positive experience.
Read more

From our sales team to our engineers, everyone at Nudge shares the responsibility for providing a positive experience.
Read more

Non-human identities have increased our attack surface—and with it, the management headache that defines the modern stack of business technology.
Read more

Non-human identities have increased our attack surface—and with it, the management headache that defines the modern stack of business technology.
Read more

With the rise in threat campaigns targeting SaaS instances, we need a shared responsibility model that includes employees as well as IT security teams.
Read more

With the rise in threat campaigns targeting SaaS instances, we need a shared responsibility model that includes employees as well as IT security teams.
Read more

A look back at the highlights, themes, and insights from Nudge Security’s “Overshadowed” interview series.
Read more

A look back at the highlights, themes, and insights from Nudge Security’s “Overshadowed” interview series.
Read more

How to discover and categorize cloud and SaaS assets in scope of SOC 2 while automating access reviews in order to stay compliant.
Read more

How to discover and categorize cloud and SaaS assets in scope of SOC 2 while automating access reviews in order to stay compliant.
Read more

While 2024 will undoubtedly throw some curveballs, one sure bet is that modern work will continue to happen across cloud and SaaS applications.
Read more

While 2024 will undoubtedly throw some curveballs, one sure bet is that modern work will continue to happen across cloud and SaaS applications.
Read more

Managing a sprawling web of OAuth grants is an unmanaged risk most organizations are just beginning to understand. Here’s how we can help.
Read more

Managing a sprawling web of OAuth grants is an unmanaged risk most organizations are just beginning to understand. Here’s how we can help.
Read more

Instead of harping on awareness, it's time to implement repeatable, real-world practice that ingrains positive habits and security behaviors.
Read more

Instead of harping on awareness, it's time to implement repeatable, real-world practice that ingrains positive habits and security behaviors.
Read more

How dark patterns in the go-to-market strategies of B2B SaaS companies are designed to work against IT and security—and what you can do about it.
Read more

How dark patterns in the go-to-market strategies of B2B SaaS companies are designed to work against IT and security—and what you can do about it.
Read more

When offboarding users, don't let their their lingering OAuth grants don’t come back to haunt you.
Read more

When offboarding users, don't let their their lingering OAuth grants don’t come back to haunt you.
Read more

Why modern data governance requires a full inventory of SaaS apps and accounts in use at your organization.
Read more

Why modern data governance requires a full inventory of SaaS apps and accounts in use at your organization.
Read more

Why IT and security leaders need a new approach to securing and governing access to new cloud-delivered technologies.
Read more

Why IT and security leaders need a new approach to securing and governing access to new cloud-delivered technologies.
Read more

The new management problem organizations must solve is safeguarding the modern mesh of SaaS and cloud accounts.
Read more

The new management problem organizations must solve is safeguarding the modern mesh of SaaS and cloud accounts.
Read more

While SSO helps to streamline employee onboarding and offboarding efforts, it’s only one piece of the SaaS identity and access puzzle.
Read more

While SSO helps to streamline employee onboarding and offboarding efforts, it’s only one piece of the SaaS identity and access puzzle.
Read more

Why applying the concepts of zero trust broadly to employees is a dangerous mistake for cybersecurity programs.
Read more

Why applying the concepts of zero trust broadly to employees is a dangerous mistake for cybersecurity programs.
Read more

Shadow IT is no longer a problem to solve—it’s a reality of modern work that must be accepted and redirected.
Read more

Shadow IT is no longer a problem to solve—it’s a reality of modern work that must be accepted and redirected.
Read more

Network monitoring and expense report analysis simply don’t work. The perfect side-channel attack on Shadow IT? Your inbox.
Read more

Network monitoring and expense report analysis simply don’t work. The perfect side-channel attack on Shadow IT? Your inbox.
Read more

CISOs used to be advised to “think like a hacker.” Now, facing mounting risks associated with SaaS sprawl and shadow IT, CISOs must learn to think like SaaS entrepreneurs.
Read more

CISOs used to be advised to “think like a hacker.” Now, facing mounting risks associated with SaaS sprawl and shadow IT, CISOs must learn to think like SaaS entrepreneurs.
Read more

Our guide to adjusting vendor security assessments to match the pace and complexity of modern work.
Read more

Our guide to adjusting vendor security assessments to match the pace and complexity of modern work.
Read more

Single sign-on is a qualifying condition for any modern product—not a premium feature that warrants a price bump.
Read more

Single sign-on is a qualifying condition for any modern product—not a premium feature that warrants a price bump.
Read more

For a clear picture of supply chain risk, the real bill of materials we need is the cumulative set of integrated software, SaaS, PaaS, and IaaS.
Read more

For a clear picture of supply chain risk, the real bill of materials we need is the cumulative set of integrated software, SaaS, PaaS, and IaaS.
Read more

Recent data breaches at Signal, Twilio, MailChimp, and others underscore the imperative of securing the SaaS supply chain.
Read more

Recent data breaches at Signal, Twilio, MailChimp, and others underscore the imperative of securing the SaaS supply chain.
Read more

As workers prioritize flexible work and learning opportunities, organizational leaders must focus on creating a positive employee experience.
Read more

As workers prioritize flexible work and learning opportunities, organizational leaders must focus on creating a positive employee experience.
Read more

When data breaches make headlines, it’s often difficult to know whether or not your organization sits in the blast radius.
Read more

When data breaches make headlines, it’s often difficult to know whether or not your organization sits in the blast radius.
Read more
