John DominguezJohn Dominguez

John Dominguez

Senior Director of Product Marketing

Expertise
  • Cybersecurity product marketing, messaging, and content creation
  • Building and leading product marketing teams in fast-growing markets
Education
  • BA in Economics and International Relations, Dartmouth College
  • MBA in Marketing and Strategy, Ross School of Business at the University of Michigan

Certifications
About the author

John Dominguez is a Senior Director of Product Marketing at Reach Security. He has over 13 years experience in cybersecurity product marketing, technology messaging and positioning, go-to-market strategy and campaigns, content creation, and product launches. In his previous role at Splunk, John led security product marketing throughout five years of rapid growth with coverage across nine products and services, including Splunk SOAR, SIEM, UEBA, Attack Analyzer, Mission Control, AI Assistant for Security, Security Essentials, Splunk Threat Research Team, and Splunk SURGe. Prior to Splunk, John spent seven years at Cisco marketing endpoint security, intrusion prevention, firewall, threat intelligence, and malware analysis products.

Articles by

John Dominguez

All articles
arrow rightarrow right
Configure → Drift → Breach → Repeat

A new research report from Reach Security reveals that misconfigured security controls, configuration drift, and unused capabilities across an organization’s existing security technology stack are a primary driver of cybersecurity risk. Among a sample of 250 cybersecurity professionals, 97% of respondents said their organization had either a confirmed breach or a near miss in the past year because of a cybersecurity tool misconfiguration.

Exploring CSPM: What is Cloud Security Posture Management?

Cloud Security Posture Management (CSPM) is a category of cloud security tooling that automates the identification and remediation of misconfigurations and security risks across cloud environments.

10 Hidden Cybersecurity Misconfigurations

Here are 10 critical cybersecurity misconfigurations we expect to see in 2026, and how Reach can identify and fix them before attackers can exploit them.

Getting Started with Reach

To join the community of customers enjoying the benefits of Reach and learn more about how it can transform your security posture, visit:

Reach Recognized in Gartner® Emerging Tech Report on Domain-Specific Language Models for SecOps
Get the report
arrow rightarrow right