Just as Newton’s Third Law of motion states “for every action, there is an equal and opposite reaction” a similar notion can be applied to the recent news of financial organizations being hacked.read more
One challenge all business leaders have in common is the expectation to customize products and services for their largest customers. Reflecting on several collaborative designs with my most demanding customers, I recognized a benefit in the process that was not obvious from the beginning — mutually beneficial relationships have gone beyond good support and competitive pricing. Providing extensibility of solutions allowing customers to differentiate services has become necessary as framework consolidation and service velocity increases.read more
If you work on an ecommerce site, you don’t need me to tell you that building and maintaining an online retail presence is fraught with challenges. Web pages are more dynamic and more complex than ever. And at the other end of the equation, shoppers have ever-increasing expectations for better prices, richer content, and faster experiences.
Meeting these demands isn’t always easy, which is why, when we conducted our latest quarterly research into the performance of the top 500 retail websites, we weren’t completely surprised to learn that many of the top retailers are making the same set of design decisions that ultimately hurt web performance. The good news is that these mistakes represent excellent “low-hanging fruit” opportunities to optimize their pages.read more
Several months ago, following an in-depth analysis of attack methods and defense techniques, the Radware Emergency Response Team (ERT), developed a set of network security predictions that the industry could face this coming year. Let’s take a look at their forecast and see where we stand now.read more
Here at Radware, our latest research into the performance and page composition of top retail sites finds that the year-over-year trend toward bigger pages that take longer to load has continued. The median top 100 ecommerce page takes 6.2 seconds to render its primary content, 10.7 seconds to fully load, and weighs in at 1677 KB. The result? The median page takes 27% longer to begin rendering than it did just one year ago.
Keep reading to find out how to mitigate the impact of “page bloat” and deliver the best possible user experience to online customers.read more
David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger.
DDoS attacks have become commonplace these days. The offending attackers may be hacktivists, cyber-criminals, and nation states or just about anyone else with an Internet grudge and a PayPal or Bitcoin account. These attacks themselves often require no technical skill. Someone with a bone to pick can simply purchase the use of any number of nodes on one or more botnets for an hourly fee (long term rate discounts available); use a Graphical User Interface (GUI) to organize the attack and then launch it.read more
A few weeks ago, news agencies shared reports on the Energetic Bear attack. This cyber-attack, or rather virus, was reportedly introduced by a Russian hacking group and it targeted oil, gas, power, and energy investment companies. The threatening malware had the ability to shut down major power grids, oil pipelines, gas, and energy traders. Analysts speculate that the attack motive was to gain competitive advantage in state-sponsored espionage against global oil and energy producers.read more
As companies accelerate their adoption of cloud technologies – like infrastructure as a service (IaaS) or software as a service (SaaS) – the need for solutions that provide secure access and reliable operations in the cloud increase in importance. Since your data will now reside in several different facilities, with different providers or partners, you now have a new “security perimeter” to monitor and defend. As such, the need to closely evaluate how cloud-based data is protected should be part of the overall security strategy. A top area of concern is defending applications from distributed-denial-of-service (DDoS) attacks.read more