Configure → Drift → Breach → Repeat: The Cycle of Cybersecurity Control Configuration Risk
Get the report
John Dominguez is a Senior Director of Product Marketing at Reach Security. He has over 13 years experience in cybersecurity product marketing, technology messaging and positioning, go-to-market strategy and campaigns, content creation, and product launches. In his previous role at Splunk, John led security product marketing throughout five years of rapid growth with coverage across nine products and services, including Splunk SOAR, SIEM, UEBA, Attack Analyzer, Mission Control, AI Assistant for Security, Security Essentials, Splunk Threat Research Team, and Splunk SURGe. Prior to Splunk, John spent seven years at Cisco marketing endpoint security, intrusion prevention, firewall, threat intelligence, and malware analysis products.
A new research report from Reach Security reveals that misconfigured security controls, configuration drift, and unused capabilities across an organization’s existing security technology stack are a primary driver of cybersecurity risk. Among a sample of 250 cybersecurity professionals, 97% of respondents said their organization had either a confirmed breach or a near miss in the past year because of a cybersecurity tool misconfiguration.
Cloud Security Posture Management (CSPM) is a category of cloud security tooling that automates the identification and remediation of misconfigurations and security risks across cloud environments.
Here are 10 critical cybersecurity misconfigurations we expect to see in 2026, and how Reach can identify and fix them before attackers can exploit them.
To join the community of customers enjoying the benefits of Reach and learn more about how it can transform your security posture, visit:
© 2026 Reach Security.
Terms of use