Alex Muntyan

Alex Muntyan

CEO · Enterprise password security

Under Alex's leadership, Passwork has been driven by a straightforward premise: enterprise-grade security should not require enterprise-grade complexity. Over the years, the company has grown from a startup into a trusted European password management platform serving thousands of organizations across the EU, the US, and beyond — fully bootstrapped, founder-owned, and independent.

He writes about the practical side of information security: how organizations actually manage credentials under real-world constraints, where compliance frameworks meet daily operations, and why most security tools fail before they're ever deployed. His perspective is shaped by years of building a product that security teams choose to use.

Articles by Alex Muntyan

Latest Jan 1, 1970
Introduction 160,000+ organizations across the EU are now subject to NIS2. 21 of 27 member states have transposed the...

NIS2 compliance made easy: How a password manager saves you money and time

Introduction 160,000+ organizations across the EU are now subject to NIS2. 21 of 27 member states have transposed the directive into national law — and under Article 32 of Directive (EU) 2022/2555, management bodies can be held personally liable for non-compliance. Fines reach €10 million or 2% of...

NIS2 compliance made easy: How a password manager saves you money and time
Mar 6, 2025 7 min read
Digital security demands the highest possible protection for passwords due to modern advances in digital presence. For...

Password security: Understanding salting and peppering

Digital security demands the highest possible protection for passwords due to modern advances in digital presence. For effective password security people need to understand that cybercriminals have developed intricate ways to break passwords. The lack of password security foundation has resulted in...

Password security: Understanding salting and peppering
Apr 1, 2025 8 min read
Businesses that ignore cybersecurity risks face breaches and financial losses. A single flaw can expose millions of...

What is a cybersecurity risk assessment?

Businesses that ignore cybersecurity risks face breaches and financial losses. A single flaw can expose millions of records. A cybersecurity risk assessment helps identify weak points, ensuring compliance and data protection. Learn how to conduct one and safeguard your organization.

What is a cybersecurity risk assessment?
Jan 1, 1970 1 min read
What Are Secrets? Secrets are sensitive digital credentials that grant access to critical systems and resources,...

Secrets management

What Are Secrets? Secrets are sensitive digital credentials that grant access to critical systems and resources, including: * Passwords and passphrases * API keys and access tokens * SSH keys and encryption keys * Digital certificates * Database credentials * Cloud service credentials Key...

Apr 11, 2026 17 min read
GPU clusters, AI-assisted wordlists, botnets of 2.8M devices. Brute force has scaled. This guide covers six attack...

Brute force attacks in 2026: What they are and how to stop them

GPU clusters, AI-assisted wordlists, botnets of 2.8M devices. Brute force has scaled. This guide covers six attack variants, real-world cases from 2025, and a layered defense strategy your team can implement today.

Brute force attacks in 2026: What they are and how to stop them
Apr 10, 2026 12 min read
A forgotten password costs $70. A breach costs $4.44 million. Both start the same way — credentials shared over Slack,...

Password chaos: Why it's a business problem and how to fix it

A forgotten password costs $70. A breach costs $4.44 million. Both start the same way — credentials shared over Slack, stored in spreadsheets, never rotated. Here's what password chaos actually costs and how to eliminate it.

Password chaos: Why it's a business problem and how to fix it
Apr 9, 2026 10 min read
NIS2 Article 21(2)(j) mandates MFA "where appropriate" — not passwordless by default. Learn what ENISA guidance...

Is NIS2 passwordless authentication required for compliance?

NIS2 Article 21(2)(j) mandates MFA "where appropriate" — not passwordless by default. Learn what ENISA guidance actually requires, how auditors evaluate your implementation, and how to build a defensible hybrid compliance posture for 2026.

Is NIS2 passwordless authentication required for compliance?
Apr 5, 2026 16 min read
NIS2's 24–72–30 reporting framework assumes continuous monitoring and structured evidence — not manual workflows under...

NIS2 compliance reporting: How automation reduces the burden

NIS2's 24–72–30 reporting framework assumes continuous monitoring and structured evidence — not manual workflows under pressure. This article maps each deadline to specific automation capabilities and defines where human judgment remains non-negotiable.

NIS2 compliance reporting: How automation reduces the burden
Apr 5, 2026 18 min read
What hosting model actually protects your credentials under EU law and why picking an EU data center isn't enough. A...

European password manager hosting: Cloud vs on-premises guide

What hosting model actually protects your credentials under EU law and why picking an EU data center isn't enough. A practical guide for European organizations navigating GDPR, NIS2, DORA, and the US CLOUD Act.

European password manager hosting: Cloud vs on-premises guide
Apr 4, 2026 15 min read
82% of attacks in 2026 are malware-free — antivirus won't catch them. This guide covers a 7-layer defense strategy...

Data breach prevention for business: Beyond basic antivirus

82% of attacks in 2026 are malware-free — antivirus won't catch them. This guide covers a 7-layer defense strategy built for credential theft, lateral movement, and supply chain compromise.

Data breach prevention for business: Beyond basic antivirus