Websense briefly classified the home page of networking giant Cisco as a hacking site earlier this week. As a result of the snafu, corporate users of Websense's web filtering technology were denied access to Cisco.com for about 15 minutes on Tuesday. Websense explained that the censorware cock-up arose because an IP address used …
If you're a company as big as Websense, and your job is to do web filtering, how does "whitelist" not make the list of features? Surely if there were such a list, cisco.com would be on it.
I'd expect a major company like Cisco to have a more-or-less permanent IP address.
"After a thorough investigation the site was reviewed and identified safe for browsing within 15 minutes."
'Thorough investigation' and '15 minutes' really don't belong in the same sentence.
It's possible that cisco.com has changed its IP address--it might be on a server farm somewhere--but something about the excuse feels a bit dodgy.
And this is why
IP-based blocking simply does not work in today's world.
You mean that isn't the right site for that?
- Nokia: Read our Maps, Samsung – we're HERE for the Gear
- Ofcom will not probe lesbian lizard snog in new Dr Who series
- Kaspersky backpedals on 'done nothing wrong, nothing to fear' blather
- Episode 9 BOFH: The current value of our IT ASSets? Minus eleventy-seven...
- Too slow with that iPhone refresh, Apple: Android is GOBBLING up US mobile market