Websense briefly classified the home page of networking giant Cisco as a hacking site earlier this week. As a result of the snafu, corporate users of Websense's web filtering technology were denied access to Cisco.com for about 15 minutes on Tuesday. Websense explained that the censorware cock-up arose because an IP address used …
If you're a company as big as Websense, and your job is to do web filtering, how does "whitelist" not make the list of features? Surely if there were such a list, cisco.com would be on it.
I'd expect a major company like Cisco to have a more-or-less permanent IP address.
"After a thorough investigation the site was reviewed and identified safe for browsing within 15 minutes."
'Thorough investigation' and '15 minutes' really don't belong in the same sentence.
It's possible that cisco.com has changed its IP address--it might be on a server farm somewhere--but something about the excuse feels a bit dodgy.
And this is why
IP-based blocking simply does not work in today's world.
You mean that isn't the right site for that?
- 'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
- Review Apple iPhone 6: Looking good, slim. How about... oh, your battery died
- Crawling from the Wreckage THE DEATH OF ECONOMICS: Aircraft design vs flat-lining financial models
- +Comment EMC, HP blockbuster 'merger' shocker comes a cropper
- Moon landing was real and WE CAN PROVE IT, says Nvidia