Alex Muntyan

Alex Muntyan

CEO · Enterprise password security

Under Alex's leadership, Passwork has been driven by a straightforward premise: enterprise-grade security should not require enterprise-grade complexity. Over the years, the company has grown from a startup into a trusted European password management platform serving thousands of organizations across the EU, the US, and beyond — fully bootstrapped, founder-owned, and independent.

He writes about the practical side of information security: how organizations actually manage credentials under real-world constraints, where compliance frameworks meet daily operations, and why most security tools fail before they're ever deployed. His perspective is shaped by years of building a product that security teams choose to use.

Articles by Alex Muntyan

Latest Apr 9, 2026
NIS2 Article 21(2)(j) mandates MFA "where appropriate" — not passwordless by default. Learn what ENISA guidance...

Is NIS2 passwordless authentication required for compliance?

NIS2 Article 21(2)(j) mandates MFA "where appropriate" — not passwordless by default. Learn what ENISA guidance actually requires, how auditors evaluate your implementation, and how to build a defensible hybrid compliance posture for 2026.

Is NIS2 passwordless authentication required for compliance?
Apr 5, 2026 16 min read
NIS2's 24–72–30 reporting framework assumes continuous monitoring and structured evidence — not manual workflows under...

NIS2 compliance reporting: How automation reduces the burden

NIS2's 24–72–30 reporting framework assumes continuous monitoring and structured evidence — not manual workflows under pressure. This article maps each deadline to specific automation capabilities and defines where human judgment remains non-negotiable.

NIS2 compliance reporting: How automation reduces the burden
Apr 5, 2026 18 min read
What hosting model actually protects your credentials under EU law and why picking an EU data center isn't enough. A...

European password manager hosting: Cloud vs on-premises guide

What hosting model actually protects your credentials under EU law and why picking an EU data center isn't enough. A practical guide for European organizations navigating GDPR, NIS2, DORA, and the US CLOUD Act.

European password manager hosting: Cloud vs on-premises guide
Apr 4, 2026 15 min read
82% of attacks in 2026 are malware-free — antivirus won't catch them. This guide covers a 7-layer defense strategy...

Data breach prevention for business: Beyond basic antivirus

82% of attacks in 2026 are malware-free — antivirus won't catch them. This guide covers a 7-layer defense strategy built for credential theft, lateral movement, and supply chain compromise.

Data breach prevention for business: Beyond basic antivirus
Apr 3, 2026 14 min read
Spring 2026 brought the EU's most significant institutional breach, its first cyber sanctions of the year, and four...

Spring 2026 EU cybersecurity update: What changed & how to prepare

Spring 2026 brought the EU's most significant institutional breach, its first cyber sanctions of the year, and four major cybersecurity regulations enforcing simultaneously. NIS2, DORA, CRA, and CSA2 now set hard deadlines — and real penalties. Here's what changed, who's affected, and what to do.

Spring 2026 EU cybersecurity update: What changed & how to prepare
Apr 2, 2026 14 min read
Credential gaps are the leading NIS2 audit failure point in 2026. This guide covers Article 21 password requirements,...

NIS2 password requirements: What European companies must do in 2026

Credential gaps are the leading NIS2 audit failure point in 2026. This guide covers Article 21 password requirements, NIST SP 800-63B alignment, AD hardening steps, and the audit evidence regulators ask for first.

NIS2 password requirements: What European companies must do in 2026
Mar 31, 2026 11 min read
Cybersecurity glossary for 2026: Zero Trust, PAM, XDR, CTEM, DSPM, PQC — and 20+ other terms explained with the...

Stop googling acronyms: Cybersecurity 101 glossary for 2026

Cybersecurity glossary for 2026: Zero Trust, PAM, XDR, CTEM, DSPM, PQC — and 20+ other terms explained with the business context vendor datasheets leave out. Organized by function, not alphabet.

Stop googling acronyms: Cybersecurity 101 glossary for 2026
Mar 25, 2026 13 min read
Choosing where to run your password manager matters as much as choosing which one. This guide breaks down cloud,...

Password manager deployment models: Cloud, self-hosted, and hybrid compared

Choosing where to run your password manager matters as much as choosing which one. This guide breaks down cloud, self-hosted, and hybrid deployment — with a compliance matrix for GDPR, HIPAA, and NIS2, and a clear look at the trade-offs each model carries.

Password manager deployment models: Cloud, self-hosted, and hybrid compared
Mar 23, 2026 9 min read
Users don't resist security — they resist friction. Five evidence-based strategies to update your password policy,...

Five ways to make users love password security

Users don't resist security — they resist friction. Five evidence-based strategies to update your password policy, drive password manager adoption, and build a security culture employees actually follow.

Five ways to make users love password security
Mar 20, 2026 20 min read
A passkey is a phishing-resistant credential stored on your device. Sign in with a biometric tap — no password to...

What is a passkey and how does it work? The complete guide to passwordless security

A passkey is a phishing-resistant credential stored on your device. Sign in with a biometric tap — no password to remember or steal. This guide covers the technical mechanics, platform setup, real-world performance data, and what the transition means for enterprise teams.

What is a passkey and how does it work? The complete guide to passwordless security