security
- Blog
- Web Performance
- Industry Benchmarks
- Podcast
- Digital experience optimization
- Webinar
- Marketing Analytics
- Security
- White Papers
- user experience
- Tag Governance
- Case Studies
- Ecommerce
- Website performance
- Accelerator Series
- Use Cases
- DEM
- Digital Commerce
- Product Announcements
- Conversion rate optimization
- Content Security Policy
- Datasheet
- Conversion rate
- Experience Design
- Holiday preparedness
- Resources
- Ultimate Guides
- Web Development
- Website Design
- eBook
security
- Blog
- Web Performance
- Industry Benchmarks
- Podcast
- Digital experience optimization
- Webinar
- Marketing Analytics
- Security
- White Papers
- user experience
- Tag Governance
- Case Studies
- Ecommerce
- Website performance
- Accelerator Series
- Use Cases
- DEM
- Digital Commerce
- Product Announcements
- Conversion rate optimization
- Content Security Policy
- Datasheet
- Conversion rate
- Experience Design
- Holiday preparedness
- Resources
- Ultimate Guides
- Web Development
- Website Design
- eBook
If you run a website or eCommerce site, you are probably vulnerable to supply chain hacking. To understand how the hack works and how your site may be vulnerable, we will look at the major supply chain attack...
More
WordPress Websites Being Attacked Before The Holidays
This week Word-Fence, the leading Web Application Firewall (WAF) for WordPress sites,...
Holiday Readiness 2020
2020 has been hard to navigate. Stay-at-home orders, social-distancing, and occupancy...
Subscribe now to FRICTIONLESS for friction fighting guidance delivered to your inbox twice a month.
E-Commerce Horror Stories
That's right folks, it's that spooky time of year again, and we here at Blue Triangle wanted to share some website tales from beyond the binary. Halloween is one thing, but the encroaching Black Friday and
Part 3: How to Stop Piggy-back Tags
Mitigating the Risk In this series, we’ve explored the legal and operational risks of piggy-back tags. We examined Equifax’s 2017 data breach caused by a supply chain attack and looked at the possibility of
What Kinds of Hacking Can a Content Security Policy Stop?
Myths and legends surround and sometimes obscure what a content security policy (CSP) is and how it can protect your website. The power of a CSP is noteworthy, but it is not an end-all be-all security
How to find out if a Site has a Content Security Policy (CSP) deployed
How to Find Out If a Site Has a Content Security Policy (CSP) Deployed A Content Security Policy is the best protection against one of the most malicious attacks on the Internet – supply chain attacks – and
eCommerce Horror Stories
That's right folks, it's that spooky time of year again, and we here at Blue Triangle wanted to share some website tales from beyond the binary. Halloween is one thing, but the encroaching Black Friday and
How to Implement a Content Security Policy (CSP)
Why You Need a CSP Every site should have a Content Security Policy (CSP). A CSP is a browser security standard that controls what domains, subdomains, and types of resources a browser can load on a given web
The Anatomy of a Magecart Attack and How to Protect Your Site in 2020
Magecart is just one of 38 JavaScript-sniffing groups that have been stealing credit cards, account numbers, and other types of personal data from millions of online shoppers in the last year. In 2018, they