Alex Muntyan

Alex Muntyan

CEO · Enterprise password security

Under Alex's leadership, Passwork has been driven by a straightforward premise: enterprise-grade security should not require enterprise-grade complexity. Over the years, the company has grown from a startup into a trusted European password management platform serving thousands of organizations across the EU, the US, and beyond — fully bootstrapped, founder-owned, and independent.

He writes about the practical side of information security: how organizations actually manage credentials under real-world constraints, where compliance frameworks meet daily operations, and why most security tools fail before they're ever deployed. His perspective is shaped by years of building a product that security teams choose to use.

Articles by Alex Muntyan

Latest May 15, 2026
28.65 million secrets leaked on public GitHub in 2025. AI is accelerating the problem. Internal repos are 6× more...

The state of secrets sprawl in 2026: Key findings from GitGuardian's report

28.65 million secrets leaked on public GitHub in 2025. AI is accelerating the problem. Internal repos are 6× more exposed than public ones. And 64% of secrets from 2022 are still valid today. Here is what the data means for your security posture.

The state of secrets sprawl in 2026: Key findings from GitGuardian's report
May 14, 2026 20 min read
APT28 hijacked 18,000 routers to steal OAuth tokens. Storm-2372 bypassed MFA without touching a password. 28.6 million...

Credential threats in April 2026: Supply chain attacks and 28 million exposed secrets

APT28 hijacked 18,000 routers to steal OAuth tokens. Storm-2372 bypassed MFA without touching a password. 28.6 million secrets leaked on GitHub. April 2026's biggest incidents — and what they have in common.

Credential threats in April 2026: Supply chain attacks and 28 million exposed secrets
Apr 28, 2026 18 min read
Why breach your network when attackers can compromise a trusted dependency with millions of downloads and slip silently...

Inside real supply chain attacks: Bitwarden CLI, Axios, and Vercel

Why breach your network when attackers can compromise a trusted dependency with millions of downloads and slip silently into thousands of organizations at once? Three 2026 campaigns prove supply chain attacks are no longer isolated incidents.

Inside real supply chain attacks: Bitwarden CLI, Axios, and Vercel
Apr 19, 2026 21 min read
84% of in-scope organizations admit they're not ready. Belgium set the first conformity assessment deadline on April...

NIS2 latest news: What changed in 2026 and what it means for EU businesses

84% of in-scope organizations admit they're not ready. Belgium set the first conformity assessment deadline on April 18, 2026. The Netherlands is days away from enforcement. Here's where the regulatory wave stands and what IT leaders need to act on now.

NIS2 latest news: What changed in 2026 and what it means for EU businesses
Apr 11, 2026 18 min read
GPU clusters, AI-assisted wordlists, botnets of 2.8M devices. Brute force has scaled. This guide covers six attack...

Brute force attacks in 2026: What they are and how to stop them

GPU clusters, AI-assisted wordlists, botnets of 2.8M devices. Brute force has scaled. This guide covers six attack variants, real-world cases from 2025, and a layered defense strategy your team can implement today.

Brute force attacks in 2026: What they are and how to stop them
Apr 10, 2026 12 min read
A forgotten password costs $70. A breach costs $4.44 million. Both start the same way — credentials shared over Slack,...

Password chaos: Why it's a business problem and how to fix it

A forgotten password costs $70. A breach costs $4.44 million. Both start the same way — credentials shared over Slack, stored in spreadsheets, never rotated. Here's what password chaos actually costs and how to eliminate it.

Password chaos: Why it's a business problem and how to fix it
Apr 9, 2026 10 min read
NIS2 Article 21(2)(j) mandates MFA "where appropriate" — not passwordless by default. Learn what ENISA guidance...

Is NIS2 passwordless authentication required for compliance?

NIS2 Article 21(2)(j) mandates MFA "where appropriate" — not passwordless by default. Learn what ENISA guidance actually requires, how auditors evaluate your implementation, and how to build a defensible hybrid compliance posture for 2026.

Is NIS2 passwordless authentication required for compliance?
Apr 5, 2026 16 min read
NIS2's 24–72–30 reporting framework assumes continuous monitoring and structured evidence — not manual workflows under...

NIS2 compliance reporting: How automation reduces the burden

NIS2's 24–72–30 reporting framework assumes continuous monitoring and structured evidence — not manual workflows under pressure. This article maps each deadline to specific automation capabilities and defines where human judgment remains non-negotiable.

NIS2 compliance reporting: How automation reduces the burden
Apr 5, 2026 18 min read
What hosting model actually protects your credentials under EU law and why picking an EU data center isn't enough. A...

European password manager hosting: Cloud vs on-premises guide

What hosting model actually protects your credentials under EU law and why picking an EU data center isn't enough. A practical guide for European organizations navigating GDPR, NIS2, DORA, and the US CLOUD Act.

European password manager hosting: Cloud vs on-premises guide
Apr 4, 2026 15 min read
82% of attacks in 2026 are malware-free — antivirus won't catch them. This guide covers a 7-layer defense strategy...

Data breach prevention for business: Beyond basic antivirus

82% of attacks in 2026 are malware-free — antivirus won't catch them. This guide covers a 7-layer defense strategy built for credential theft, lateral movement, and supply chain compromise.

Data breach prevention for business: Beyond basic antivirus