Mate Korac (@koracmate) 's Twitter Profile
Mate Korac

@koracmate

A force for delivering adaptive apps securely, across multi-cloud to drive agility, telemetry, reduce friction and improve time to market. @nginx @f5

ID: 1068097577164435456

linkhttps://ie.linkedin.com/in/matekorac calendar_today29-11-2018 11:01:21

65 Tweet

264 Followers

695 Following

Mate Korac (@koracmate) 's Twitter Profile Photo

Check out the latest F5 content and events for the financial services sector, including new attack vector security research, 5 cybersecurity predictions for 2023, and events for you and your team. bit.ly/3ZDYJBp

Check out the latest F5 content and events for the financial services sector, including new attack vector security research, 5 cybersecurity predictions for 2023, and events for you and your team. bit.ly/3ZDYJBp
F5 (@f5) 's Twitter Profile Photo

How do you make business faster? It's not just about improving functions, you also need to improve the way you make those functions available! Hear from Distinguished Engineer Lori MacVittie about where #AppDelivery might go in the future: go.f5.net/py36ed

Mate Korac (@koracmate) 's Twitter Profile Photo

Michael Willhight has Guides for Engineers by Engineers! He shares F5's Use Case Guide to Service Proxy (SPK) for Kubernetes. bit.ly/3JFh0c7

Michael Willhight has Guides for Engineers by Engineers! He shares <a href="/F5/">F5</a>'s Use Case Guide to Service Proxy (SPK) for Kubernetes. bit.ly/3JFh0c7
Mate Korac (@koracmate) 's Twitter Profile Photo

Since the start of the pandemic, e-commerce and online services have become increasingly popular, with the global e-commerce growth rate for 2023 expected to surge more. Growing threats continue from cybercriminals seeking to steal data. Read more bit.ly/3lqJBbw

Since the start of the pandemic, e-commerce and online services have become increasingly popular, with the global e-commerce growth rate for 2023 expected to surge more. Growing threats continue from cybercriminals seeking to steal data. Read more bit.ly/3lqJBbw
Mate Korac (@koracmate) 's Twitter Profile Photo

FinServ organisations experienced the highest ratio of incidents attributed to password login attacks (46.2%) compared to all other sectors from 2018 - 2020. F5 Labs has the details, read here: bit.ly/3JMfk0l

FinServ organisations experienced the highest ratio of incidents attributed to password login attacks (46.2%) compared to all other sectors from 2018 - 2020. 

F5 Labs has the details, read here: 
 bit.ly/3JMfk0l
Mate Korac (@koracmate) 's Twitter Profile Photo

The growth of #APIs has not been accompanied by an increase in security. To secure new endpoints, your teams can learn to recognise API vulnerabilities. Discover how: bit.ly/3ToTNhw

The growth of #APIs has not been accompanied by an increase in security. To secure new endpoints, your teams can learn to recognise API vulnerabilities. Discover how: 
 bit.ly/3ToTNhw
Mate Korac (@koracmate) 's Twitter Profile Photo

What is #WAAP? It is an evolution of the #WAF, conceptually and it stands for Web Application & API Protection (WAAP). Like a WAF in that the focus is to defend against Layer 7 attacks and also to provide protocol enforcement at L4. Aubrey King shares bit.ly/40d4eXE

What is #WAAP? It is an evolution of the #WAF, conceptually and it stands for Web Application &amp; API Protection (WAAP). Like a WAF in that the focus is to defend against Layer 7 attacks and also to provide protocol enforcement at L4. <a href="/AubreyKingF5/">Aubrey King</a> shares bit.ly/40d4eXE
Mate Korac (@koracmate) 's Twitter Profile Photo

In the final article on decrypting BIG-IP packet captures, __Mifflin__ takes the advice of MVP'ers Nikoolayy1 and Juergen_Mang by losing iRules and uses the system database key that allows you to embed the session keys in the tcpdump capture. bit.ly/3zgcx9P

In the final article on decrypting BIG-IP packet captures, <a href="/jasonrahm/">__Mifflin__</a> takes the advice of MVP'ers Nikoolayy1 and Juergen_Mang by losing iRules and uses the system database key that allows you to embed the session keys in the tcpdump capture. bit.ly/3zgcx9P
Mate Korac (@koracmate) 's Twitter Profile Photo

Join this webinar as members of the Payment Card Industry and F5 outline the new PCI DSS 4.0 requirements and the steps to meet the new client-side protections. #pci #clientside bit.ly/3FGx3nq

Join this webinar as members of the Payment Card Industry and F5 outline the new PCI DSS 4.0 requirements and the steps to meet the new client-side protections. #pci #clientside bit.ly/3FGx3nq
Mate Korac (@koracmate) 's Twitter Profile Photo

I remember how hard it was to put together a security solution that worked for my complex, bolted together architecture. F5 is showing real thought leadership in creating a security solution that can work for any app, API, or infrastructure! bit.ly/40gdkU2

Mate Korac (@koracmate) 's Twitter Profile Photo

This article from Ted Byerly will show you how to configure and use F5 Distributed Cloud Bot Defense on BIG-IP version 17.1 and above to monitor the solution on F5 Distributed Cloud Console. bit.ly/3z8GrfZ

This article from Ted Byerly will show you how to configure and use <a href="/F5/">F5</a> Distributed Cloud Bot Defense on BIG-IP version 17.1 and above to monitor the solution on F5 Distributed Cloud Console. bit.ly/3z8GrfZ
Mate Korac (@koracmate) 's Twitter Profile Photo

App delivery and security needs to be incorporated into the design process, rather than viewed as individual component decisions to be made after the fact, or businesses risk eliciting poor #digitalexperiences. bit.ly/3KhXSRL

App delivery and security needs to be incorporated into the design process, rather than viewed as individual component decisions to be made after the fact, or businesses risk eliciting poor #digitalexperiences.  bit.ly/3KhXSRL
Mate Korac (@koracmate) 's Twitter Profile Photo

Don’t let your company fall behind. 88% of organizations are moving to a platform approach to security. Learn why in our 2023 State of Application Strategy Report. bit.ly/3GgFXsf

Don’t let your company fall behind. 88% of organizations are moving to a platform approach to security. Learn why in our 2023 State of Application Strategy Report. bit.ly/3GgFXsf
Mate Korac (@koracmate) 's Twitter Profile Photo

We're using Terraform to deploy an application server running the OWASP Juice Shop application serviced by a F5 BIG-IP Advanced WAF VE with F5 Distributed Cloud Web App and API Protection to provide Bot and DDoS Defense at the Edge. via F5 DevCentral bit.ly/3m28hHX

Mate Korac (@koracmate) 's Twitter Profile Photo

So excited about all the ways F5 is making security radically simple. Check out this blog to see how we’re reducing complexity in today’s highly-distributed app environment. As always, let me know what you think. bit.ly/3zDJgWD

So excited about all the ways F5 is making security radically simple. Check out this blog to see how we’re reducing complexity in today’s highly-distributed app environment. As always, let me know what you think. bit.ly/3zDJgWD
Mate Korac (@koracmate) 's Twitter Profile Photo

#AI adoption is imminent and could be critical to remaining competitive. This means #security must be proactive and get ahead of AI adoption now to guide it along a #risk-appropriate path. bit.ly/3KmSWts

#AI adoption is imminent and could be critical to remaining competitive. This means #security must be proactive and get ahead of AI adoption now to guide it along a #risk-appropriate path. bit.ly/3KmSWts
Mate Korac (@koracmate) 's Twitter Profile Photo

As graduation season nears, F5's Hunter Smit shares how financial aid and student loan servicers can build trust while keeping students and recent graduates safe. bit.ly/3zSaGbg

As graduation season nears, <a href="/F5/">F5</a>'s Hunter Smit shares how financial aid and student loan servicers can build trust while keeping students and recent graduates safe.  bit.ly/3zSaGbg
Mate Korac (@koracmate) 's Twitter Profile Photo

Leverage #telemetrydata to go beyond application monitoring and observability. Learn the importance of this in a maturing #digitalbusiness and #IT modernization. bit.ly/3MR7C7c

Leverage #telemetrydata to go beyond application monitoring and observability. Learn the importance of this in a maturing #digitalbusiness and #IT modernization. bit.ly/3MR7C7c