John DominguezJohn Dominguez

John Dominguez

Senior Director of Product Marketing

Expertise
  • Cybersecurity product marketing, messaging, and content creation
  • Building and leading product marketing teams in fast-growing markets
Education
  • BA in Economics and International Relations, Dartmouth College
  • MBA in Marketing and Strategy, Ross School of Business at the University of Michigan

Certifications
About the author

John Dominguez is a Senior Director of Product Marketing at Reach Security. He has over 13 years experience in cybersecurity product marketing, technology messaging and positioning, go-to-market strategy and campaigns, content creation, and product launches. In his previous role at Splunk, John led security product marketing throughout five years of rapid growth with coverage across nine products and services, including Splunk SOAR, SIEM, UEBA, Attack Analyzer, Mission Control, AI Assistant for Security, Security Essentials, Splunk Threat Research Team, and Splunk SURGe. Prior to Splunk, John spent seven years at Cisco marketing endpoint security, intrusion prevention, firewall, threat intelligence, and malware analysis products.

Articles by

John Dominguez

All articles
arrow rightarrow right
What Device Code Phishing Reveals About Security Configuration Gaps

Recent research from Proofpoint highlights a growing trend in identity-based attacks. Rather than stealing passwords or exploiting software flaws, multiple threat actors are now abusing legitimate Microsoft authentication workflows to gain access to Microsoft 365 accounts at scale. This technique, known as device code phishing, is not new. What is new is how widespread the technique has become, particularly among both state-aligned and financially motivated adversaries. More importantly, it underscores a recurring theme in modern security incidents. The attack succeeds not because a control failed, but because it was not properly configured to stop this behavior.

When Misconfigurations Become the Front Door: What Russia’s Edge Device Campaign Signals for Modern Cyber Defense

A recent Dark Reading article highlighted a sobering shift in how nation-state threat actors are gaining access to critical infrastructure. According to reporting on a new Amazon Threat Intelligence disclosure, Russian actors affiliated with the GRU have spent years refining a campaign that increasingly bypasses traditional vulnerability exploitation altogether. Instead, they are walking straight through the front door left open by misconfigured network edge devices.

Getting Started with Reach

To join the community of customers enjoying the benefits of Reach and learn more about how it can transform your security posture, visit:

Just Released: AI Buyer’s Guide for Security Architects
Get the Guide
arrow rightarrow right