Websense briefly classified the home page of networking giant Cisco as a hacking site earlier this week. As a result of the snafu, corporate users of Websense's web filtering technology were denied access to Cisco.com for about 15 minutes on Tuesday. Websense explained that the censorware cock-up arose because an IP address used …
If you're a company as big as Websense, and your job is to do web filtering, how does "whitelist" not make the list of features? Surely if there were such a list, cisco.com would be on it.
I'd expect a major company like Cisco to have a more-or-less permanent IP address.
"After a thorough investigation the site was reviewed and identified safe for browsing within 15 minutes."
'Thorough investigation' and '15 minutes' really don't belong in the same sentence.
It's possible that cisco.com has changed its IP address--it might be on a server farm somewhere--but something about the excuse feels a bit dodgy.
And this is why
IP-based blocking simply does not work in today's world.
You mean that isn't the right site for that?
- Leaked screenshots show next Windows kernel to be a perfect 10
- Amazon warming up 'cheapo web video' cannon to SINK Netflix
- Something for the Weekend, Sir? I need a password to BRAKE? What? No! STOP! Aaaargh!
- Episode 13 BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
- Vulture at the Wheel Ford's B-Max: Fiesta-based runaround that goes THUNK