Websense briefly classified the home page of networking giant Cisco as a hacking site earlier this week. As a result of the snafu, corporate users of Websense's web filtering technology were denied access to Cisco.com for about 15 minutes on Tuesday. Websense explained that the censorware cock-up arose because an IP address used …
If you're a company as big as Websense, and your job is to do web filtering, how does "whitelist" not make the list of features? Surely if there were such a list, cisco.com would be on it.
I'd expect a major company like Cisco to have a more-or-less permanent IP address.
"After a thorough investigation the site was reviewed and identified safe for browsing within 15 minutes."
'Thorough investigation' and '15 minutes' really don't belong in the same sentence.
It's possible that cisco.com has changed its IP address--it might be on a server farm somewhere--but something about the excuse feels a bit dodgy.
And this is why
IP-based blocking simply does not work in today's world.
You mean that isn't the right site for that?
- Breaking news: Google exec veep in terrifying SKY PLUNGE DRAMA
- Geek's Guide to Britain Kingston's aviation empire: From industry firsts to Airfix heroes
- Analysis Happy 2nd birthday, Windows 8 and Surface: Anatomy of a disaster
- Google CEO Larry Page gives Sundar Pichai keys to the kingdom
- Something for the Weekend, Sir? SKYPE has the HOTS for my NAKED WIFE