Websense briefly classified the home page of networking giant Cisco as a hacking site earlier this week. As a result of the snafu, corporate users of Websense's web filtering technology were denied access to Cisco.com for about 15 minutes on Tuesday. Websense explained that the censorware cock-up arose because an IP address used …
If you're a company as big as Websense, and your job is to do web filtering, how does "whitelist" not make the list of features? Surely if there were such a list, cisco.com would be on it.
I'd expect a major company like Cisco to have a more-or-less permanent IP address.
"After a thorough investigation the site was reviewed and identified safe for browsing within 15 minutes."
'Thorough investigation' and '15 minutes' really don't belong in the same sentence.
It's possible that cisco.com has changed its IP address--it might be on a server farm somewhere--but something about the excuse feels a bit dodgy.
And this is why
IP-based blocking simply does not work in today's world.
You mean that isn't the right site for that?
- Vid Hubble 'scope snaps 200,000-ton chunky crumble conundrum
- Updated + vids WHOA: Get a load of Asteroid DX110 JUST MISSING planet EARTH
- 10 years of Facebook Inside Facebook's engineering labs: Hardware heaven, HP hell – PICTURES
- Very fabric of space-time RIPPED apart in latest Hubble pic
- Massive new AIRSHIP to enter commercial service at British dirigible base