Cyber Monday is just around the corner, and early predictions point to holiday ecommerce sales hitting an all-time record of $72 billion. But retailers know that competition for this ecommerce spend will also be at an all-time high. Many will leverage aggressive strategies, ranging from rich visuals to geo-targeting campaigns, to earn their share of the holiday retail pie. These strategies, however, can come with a significant performance price tags, making pages slow to render — and ultimately driving away consumers.
Today at Radware, we’ve released our latest research into the performance of the world’s most popular ecommerce sites. Our research answers the question: In the fight to offer shoppers the richest possible content, are retailers helping or hurting the user experience?read more
Mobile used to take the backseat to desktop, but in 2014 this is no longer the case. One out of four people worldwide own a smartphone, and at least 55% of all time spent on retail sites takes place on mobile devices. These numbers are why we’ve decided to release our annual state of the union for mobile web performance on the same day as our quarterly desktop state of the union.
In this post, I’ll walk through a high-level summary of our key findings, including statistics around mobile load times, website fragmentation across devices, and mobile performance challenges.read more
Over the past week Radware’s Emergency Response Team (ERT) detected a new type of SYN flood which is believed to be specially designed to overcome most of today’s security defenses with a TCP-based volume attack. Within a 48-hour period two different targets in two different continents were targeted with this new technique and have experienced very high attack volumes.read more
Online criminality has become a big business and new faces of social engineering and fraud are sweeping the globe. News articles regularly report on major breaches and outages, but rarely, if ever, do we see the underlying ransom demands that are presented before a business is attacked. The stand that organizations often take is that they do not negotiate with terrorists or pirates. But this approach, while noble, can become costly to a business, some may lose everything.read more
Financial institutions, such as banks and credit unions, have long been a target of cyber and DDoS attacks. These attacks are designed to disrupt operations and access sensitive information, becoming a constant threat, to not only those businesses but to the customers they serve.read more
Faster load times correlate with improved business metrics (ranging from page views to revenues). With images comprising more than half of a typical page’s weight, it only makes sense that optimizing images so that they render more quickly in the user’s browser should be a priority for every site owner.
Selecting the best image rendering format is the first step on the path toward fully optimized images, but even this first step is fraught with debate. At the core of the debate is this seemingly simple question: Should we use baseline or progressive images? If you’re not a web designer or developer, you might find yourself wondering if this is really a crucial question. But if you are a designer or developer, you’re aware that this question has major ramifications in terms of creating the best possible user experience.
At Radware, our latest research — released today — explores this important user experience issue and yields answers that are supported by real data.read more
Last week, I was invited to speak at the 16th annual AT&T Cyber Security Conference in NYC where over the span of two days, speakers kept the audience immersed with engaging topics. Surrounded by security executives, I learned that we all share similar concerns. There were resounding messages that resonated with me that I’d like to share as my key takeaways from the event.read more
Denial of Service (DoS) has reigned as the most headline-grabbing network attack over the past three years. However, the truth is that attacks come in all different flavors ranging from Distributed DoS (DDoS) to low-volume application-layer attacks that target user credentials, financial information, trade secrets, or abuse of services to commit fraud. At the application layer we most often think of HTTP, however, there are almost an immeasurable number of Layer 7 applications available for exploit.read more