Passwork Blog

Latest Jan 1, 1970
Introduction 160,000+ organizations across the EU are now subject to NIS2. 21 of 27 member states have transposed the...

NIS2 compliance made easy: How a password manager saves you money and time

Introduction 160,000+ organizations across the EU are now subject to NIS2. 21 of 27 member states have transposed the directive into national law — and under Article 32 of Directive (EU) 2022/2555, management bodies can be held personally liable for non-compliance. Fines reach €10 million or 2% of...

NIS2 compliance made easy: How a password manager saves you money and time
Jan 1, 1970 15 min read
An API key is a unique authentication token that identifies and authorizes an application or user when making requests...

What is an API Key? Guide to secure system design

An API key is a unique authentication token that identifies and authorizes an application or user when making requests to an API. More than a simple password, it serves as a programmatic credential that enables secure, automated communication between software systems while providing granular...

What is an API Key? Guide to secure system design
Jan 1, 1970 6 min read
Password strength determines how resistant your password is to guessing and brute force attacks. A strong password...

What is password strength and how is it measured?

Password strength determines how resistant your password is to guessing and brute force attacks. A strong password protects your accounts from unauthorized access, while a weak password can be cracked in seconds. Security researchers measure password strength by calculating how many attempts an...

What is password strength and how is it measured?
Mar 6, 2025 7 min read
Digital security demands the highest possible protection for passwords due to modern advances in digital presence. For...

Password security: Understanding salting and peppering

Digital security demands the highest possible protection for passwords due to modern advances in digital presence. For effective password security people need to understand that cybercriminals have developed intricate ways to break passwords. The lack of password security foundation has resulted in...

Password security: Understanding salting and peppering
Apr 1, 2025 8 min read
Businesses that ignore cybersecurity risks face breaches and financial losses. A single flaw can expose millions of...

What is a cybersecurity risk assessment?

Businesses that ignore cybersecurity risks face breaches and financial losses. A single flaw can expose millions of records. A cybersecurity risk assessment helps identify weak points, ensuring compliance and data protection. Learn how to conduct one and safeguard your organization.

What is a cybersecurity risk assessment?
Jan 1, 1970 1 min read
What Are Secrets? Secrets are sensitive digital credentials that grant access to critical systems and resources,...

Secrets management

What Are Secrets? Secrets are sensitive digital credentials that grant access to critical systems and resources, including: * Passwords and passphrases * API keys and access tokens * SSH keys and encryption keys * Digital certificates * Database credentials * Cloud service credentials Key...

Apr 11, 2026 17 min read
GPU clusters, AI-assisted wordlists, botnets of 2.8M devices. Brute force has scaled. This guide covers six attack...

Brute force attacks in 2026: What they are and how to stop them

GPU clusters, AI-assisted wordlists, botnets of 2.8M devices. Brute force has scaled. This guide covers six attack variants, real-world cases from 2025, and a layered defense strategy your team can implement today.

Brute force attacks in 2026: What they are and how to stop them
Apr 10, 2026 12 min read
A forgotten password costs $70. A breach costs $4.44 million. Both start the same way — credentials shared over Slack,...

Password chaos: Why it's a business problem and how to fix it

A forgotten password costs $70. A breach costs $4.44 million. Both start the same way — credentials shared over Slack, stored in spreadsheets, never rotated. Here's what password chaos actually costs and how to eliminate it.

Password chaos: Why it's a business problem and how to fix it
Apr 9, 2026 10 min read
NIS2 Article 21(2)(j) mandates MFA "where appropriate" — not passwordless by default. Learn what ENISA guidance...

Is NIS2 passwordless authentication required for compliance?

NIS2 Article 21(2)(j) mandates MFA "where appropriate" — not passwordless by default. Learn what ENISA guidance actually requires, how auditors evaluate your implementation, and how to build a defensible hybrid compliance posture for 2026.

Is NIS2 passwordless authentication required for compliance?
Apr 7, 2026 4 min read
The latest Passwork release adds service accounts with multi-token API support, saved filters, mobile web UI, and...

Passwork 7.6: Service accounts

The latest Passwork release adds service accounts with multi-token API support, saved filters, mobile web UI, and automatic Bin cleanup. See what changed.

Passwork 7.6: Service accounts