The Frictionless Experience: The podcast where we slay friction one episode at a time   Listen to the podcast

Resource Hub

Blue Triangle offers the only complete platform purpose-built for Continuous Experience Optimization powered by Business Outcomes

Digital Experience Monitoring (DEM): What it is and Why it's important

Web Performance DEM Blog
What is Digital Experience Monitoring and why do I need it? Digital Experience Monitoring analyzes and monitors the end-user experience with a web application. As control over user experience has been lost to

Part 3: How to Stop Piggy-back Tags

Security Tag Governance Blog
Mitigating the Risk In this series, we’ve explored the legal and operational risks of piggy-back tags. We examined Equifax’s 2017 data breach caused by a supply chain attack and looked at the possibility of

How Function Tracing Can Help You Optimize Your Site

Web Performance Blog
What else can I do to optimize my site? So you have optimized your images, cached your queries, and lazy loaded your page. But your load time and Time To Interactive are still slow. Now what? Our engineers and

Defend Your Site Against Cross Site Scripting and Other Supply Chain Attacks During COVID-19 Featuring F5

Webinar
About the Webinar The second part in a four-part webinar series on tag governance. With more business than ever transacting online, cybercriminals are seizing the opportunity to capitalize. In this

Piggyback Tags, Part 2: Piggyback Tags and the California Consumer Protection Act

Tag Governance Blog
The U.S. Data Privacy Legal Landscape is Highly Fragmented The US data privacy legal landscape is a patchwork of federal and state laws.At the federal level, data privacy laws vary by business sector. For

What Kinds of Hacking Can a Content Security Policy Stop?

Security Blog
Myths and legends surround and sometimes obscure what a content security policy (CSP) is and how it can protect your website. The power of a CSP is noteworthy, but it is not an end-all be-all security

How to find out if a Site has a Content Security Policy (CSP) deployed

Security Tag Governance Blog
How to Find Out If a Site Has a Content Security Policy (CSP) Deployed A Content Security Policy is the best protection against one of the most malicious attacks on the Internet – supply chain attacks – and

Legal and Operational Risks of Piggyback Tags, Part 1: What the Heck Are They and Why Should I Care?

Blog
What Are Tags? Every business website has “Tags” – they are the pixel or code mechanisms that facilitate the collection and sharing of data between your website and the services you rely on for site analytics

Office Hours with Blue Triangle: Coffee and Content Security Policies

Webinar
About the Webinar Join Blue Triangle as we have an open discussion on protections around Magecart and other Supply Chain attacks. Challenges with protection Current Security layers - how and what they

Magecart Attacks: I Can't Sleep At Night

Webinar
About the Webinar The first of a four part webinar series on first and third-party tag governance. In this session, founder and CTO, Tim Grant, joins VP of Digital Performance Strategy, Gus Anderson,

The Gift of Web Performance: Making eCommerce Miracles

Case Studies Blog
It's that special time of year, and we can all feel it. Thanksgiving and the weekend of deals that follow have come and gone, Jack Frost is making his rounds, and everyone is looking forward to that time off

Cyber Monday 2019: The Fastest and Slowest Retail Websites

Web Performance Industry Benchmarks Blog
< Black Friday report<< Thanksgiving Day report Spending on Cyber Monday increased 19.7% from last year - totaling a whopping $9.4B. Our retail customer traffic increased 66% between Sunday 12/1 and Cyber