As mentioned a bit ago at one of our monthly IT meetings, Information Security & Compliance uses information from both the subnet managers list and the domain information database to generate the contacts for their NETIRTs and UFIRTs. There is… Read More