Resources Hub

Blue Triangle offers the only complete platform purpose-built for Continuous Experience Optimization powered by Business Outcomes

Supply Chain Attacks - Actions All Websites Should Take

Security Content Security Policy Blog
If you run a website or eCommerce site, you are probably vulnerable to supply chain hacking. To understand how the hack works and how your site may be vulnerable, we will look at the major supply chain attack...
More

E-Commerce Horror Stories

Web Performance Security Industry Benchmarks Blog
That's right folks, it's that spooky time of year again, and we here at Blue Triangle wanted to share some website tales from beyond the binary. Halloween is one thing, but the encroaching Black Friday and

Part 3: How to Stop Piggy-back Tags

Security Tag Governance Blog
Mitigating the Risk In this series, we’ve explored the legal and operational risks of piggy-back tags. We examined Equifax’s 2017 data breach caused by a supply chain attack and looked at the possibility of

What Kinds of Hacking Can a Content Security Policy Stop?

Security Blog
Myths and legends surround and sometimes obscure what a content security policy (CSP) is and how it can protect your website. The power of a CSP is noteworthy, but it is not an end-all be-all security

How to find out if a Site has a Content Security Policy (CSP) deployed

Security Tag Governance Blog
  How to Find Out If a Site Has a Content Security Policy (CSP) Deployed A Content Security Policy is the best protection against one of the most malicious attacks on the Internet – supply chain attacks – and

Piggyback Tags: Legal and Operational Risks Part 1: What the Heck Are They and Why Should I Care?

Security Tag Governance Blog Use Cases
Every business website has “Tags” – they are the pixel or code mechanisms that facilitate the collection and sharing of data between your website and the services you rely on for site analytics and marketing.

eCommerce Horror Stories

Web Performance Security Industry Benchmarks Blog
That's right folks, it's that spooky time of year again, and we here at Blue Triangle wanted to share some website tales from beyond the binary. Halloween is one thing, but the encroaching Black Friday and

How to Implement a Content Security Policy (CSP)

Security Blog
Why You Need a CSP Every site should have a Content Security Policy (CSP). A CSP is a browser security standard that controls what domains, subdomains, and types of resources a browser can load on a given web

The Anatomy of a Magecart Attack and How to Protect Your Site in 2020

Security Blog
Magecart is just one of 38 JavaScript-sniffing groups that have been stealing credit cards, account numbers, and other types of personal data from millions of online shoppers in the last year. In 2018, they

Why your site needs a Content Security Policy (CSP)

Security Blog
A Content Security Policy (CSP) can help protect your site from data breaches caused by cross-site scripting (XSS) and formjacking attacks. A CSP also prevents client-side malware from injecting unwanted ads