| CARVIEW |
Select Language
HTTP/2 302
server: nginx
date: Sun, 11 Jan 2026 05:54:08 GMT
content-type: text/plain; charset=utf-8
content-length: 0
x-archive-redirect-reason: found capture at 20100419035816
location: https://web.archive.org/web/20100419035816/https://listorious.com/digiphile/informationsecurity
server-timing: captures_list;dur=0.499642, exclusion.robots;dur=0.044192, exclusion.robots.policy;dur=0.035294, esindex;dur=0.008991, cdx.remote;dur=21.331177, LoadShardBlock;dur=721.667980, PetaboxLoader3.datanode;dur=566.100555, PetaboxLoader3.resolve;dur=74.304035
x-app-server: wwwb-app213-dc8
x-ts: 302
x-tr: 764
server-timing: TR;dur=0,Tw;dur=0,Tc;dur=0
set-cookie: wb-p-SERVER=wwwb-app213; path=/
x-location: All
x-as: 14061
x-rl: 0
x-na: 0
x-page-cache: MISS
server-timing: MISS
x-nid: DigitalOcean
referrer-policy: no-referrer-when-downgrade
permissions-policy: interest-cohort=()
HTTP/2 200
server: nginx
date: Sun, 11 Jan 2026 05:54:09 GMT
content-type: text/html; charset=UTF-8
x-archive-orig-date: Mon, 19 Apr 2010 03:58:15 GMT
x-archive-orig-server: Apache/2.2.3 (CentOS)
x-archive-orig-x-powered-by: PHP/5.2.9
x-archive-orig-cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
x-archive-orig-pragma: no-cache
x-archive-orig-expires: Thu, 19 Nov 1981 08:52:00 GMT
x-archive-orig-connection: close
x-archive-guessed-content-type: text/html
x-archive-guessed-charset: utf-8
memento-datetime: Mon, 19 Apr 2010 03:58:16 GMT
link: ; rel="original", ; rel="timemap"; type="application/link-format", ; rel="timegate"
content-security-policy: default-src 'self' 'unsafe-eval' 'unsafe-inline' data: blob: archive.org web.archive.org web-static.archive.org wayback-api.archive.org athena.archive.org analytics.archive.org pragma.archivelab.org wwwb-events.archive.org
x-archive-src: 52_15_20100419033947_crawl101-c/52_15_20100419035812_crawl101.arc.gz
server-timing: captures_list;dur=1.009440, exclusion.robots;dur=0.032909, exclusion.robots.policy;dur=0.013782, esindex;dur=0.018291, cdx.remote;dur=29.120028, LoadShardBlock;dur=110.278781, PetaboxLoader3.datanode;dur=104.328909, load_resource;dur=144.148636, PetaboxLoader3.resolve;dur=62.477065
x-app-server: wwwb-app213-dc8
x-ts: 200
x-tr: 439
server-timing: TR;dur=0,Tw;dur=0,Tc;dur=0
x-location: All
x-as: 14061
x-rl: 0
x-na: 0
x-page-cache: MISS
server-timing: MISS
x-nid: DigitalOcean
referrer-policy: no-referrer-when-downgrade
permissions-policy: interest-cohort=()
content-encoding: gzip
Informationsecurity Twitter List by Alex Howard on Listorious
The definitive list of who matters on Twitter
Follow @listorious on Twitter to be notified of more follow-worthy lists!
Informationsecurity
Jennifer Leggio
ZDNet social business blogger + Quick'n'Dirty Podcast co-host + strategic communications director + Security Twits herder emeritus + hockey fan16,100 followers | Follow
SCMagazine
Our mission is to provide IT security professionals with in-depth and unbiased information in one incomparable publication.5,971 followers | Follow
Security Twits
Official Security Twits Account -- Questions? @quine, @geekgrrl, @hypatiadotca5,580 followers | Follow
Sean-Paul Correll
Threat Researcher @ Panda Security and Founder of Malware Database.5,461 followers | Follow
Christofer Hoff
Cloud & Virtualization (Security) Dude. Director, Cloud & Virtualization Solutions @ Cisco (which has nothing to do with my word salad here)4,005 followers | Follow
SANS Institute
SANS is the most trusted and by far the largest source for information security training, certification and research in the world.3,746 followers | Follow
Graham Cluley
Senior technology consultant, Sophos. Viruses, spam, computer security, that kind of stuff.3,705 followers | Follow
Threatpost
Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world. Run by @christenrice and @kteb.3,651 followers | Follow
Jeremiah Grossman
Founder / CTO, WhiteHat Security. Connoisseur of all things Web Security and Brazilian Jiu Jitsu related.3,033 followers | Follow
George V. Hulme
Enterprise technologies, convergence, IT security, and editorial consultant2,944 followers | Follow
briankrebs
computer, internet security journalist, writes about cyber crime. wrote for The Washington Post '95-'092,899 followers | Follow
Keith Crawford
Network Engineer, Social Media Evangelist, Security Geek, Conservative, Christian, Husband, Southerner2,595 followers | Follow
Leigh Honeywell
@HackLabTO co-founder, @NSSLabs analyst, security consultant, Ubuntu member, geek feminist; my tweets represent only myself.2,425 followers | Follow
Dan Philpott
Federal information security policy and practice wonk focused on improving the art of state security through state of the art security2,288 followers | Follow
Jack Daniel
Phear the Sock Puppets! Sporadic blogger, Tech Community Activist, InfoSec Curmudgeon, Reluctant CISSP, Amateur Blacksmith, and stuff.2,256 followers | Follow
Alexander Sotirov
The term "security researcher" makes hacking sound respectable, but it's still the same thing.2,203 followers | Follow
Richard Bejtlich
Director of Incident Response for General Electric. TaoSecurity blogger. Author. Black Hat instructor.2,171 followers | Follow
Rob Fuller
What I'm about to tell you has already been said, and it was wrong then too2,128 followers | Follow
Elinor Mills
CNET News.com Internet security and privacy reporter with a zest for life.2,127 followers | Follow
Christopher Burgess
Author/Speaker.Intellectual Property-Intelligence-Security-Safety-SocialMedia. Protect families especially the elderly/young; Humanitarian issues. Enjoying Life2,113 followers | Follow
jj Jennifer Jabbusch
CISSP, HP MASE, Network Infrastructure Specialist, 802.1X devotee, aka security diva ;p2,103 followers | Follow
Lenny Zeltser
Sharing thoughts on information security, IT, and business trends, with a particular focus on malicious software2,066 followers | Follow
Christophe Veltsos
InfoSec, Risk, and Privacy Strategist. More at www.linkedin.com/in/chrisveltsos2,010 followers | Follow
Angelina Ward
Publisher of InfoSec, Digital Forensics, Virtualization, and Sys Admin, and Security topics at Syngress1,785 followers | Follow
Martin McKeay
Blogger, podcaster and security twit. Talking about Security since 20041,766 followers | Follow
Chris Ensey
Principal Security Strategist for IBM Federal. Want to learn, share, collaborate! These are my tweets & do not represent my employers opinion.1,729 followers | Follow
Dave Lewis
security type, #blogger, breaker of things, bass player, dad, #infosec #security #smartgrid, creator of the (-:|3 emoticon, dubcloud.com1,681 followers | Follow
B.K. DeLong
Dad. Husband. Researcher. Occasional Producer. Community Builder. Futurist. Friend and Listener.1,501 followers | Follow
SearchSecurityTT
The latest cybersecurity news, tips and features from the SearchSecurity.com news and site team. Security threats, data breaches, research, reports and more.1,471 followers | Follow
Dejan Kosutic
Expert in information security management (ISO 27001 standard) and business continuity management (BS 25999-2 standard)1,460 followers | Follow
Alex Hutton
I like risk! Also, My comments do not not necessarily represent the views of my employer, Verizon Business1,302 followers | Follow
ITCompliance
SearchCompliance.com helps IT professionals manage information systems and IT to improve compliance processes and results.1,289 followers | Follow
Marcus J. Carey
Director of Innovation at Saecur. Information Assurance Architect, Inventor, Knowledge Transfer Expert, Mentor, and Speaker.1,271 followers | Follow
Nick Selby
Cyber security and risk management consultant, ex-security analyst, intel geek, dad, baker's husband1,179 followers | Follow
Scott Crawford
Polymath, pundit, airhead (AMEL, CFII). Research Director, Security and Risk, Enterprise Management Associates (EMA)1,027 followers | Follow
Paul Roberts
tech analyst, blogger, writer and dad. Interests: computer security, hacking and e-crime, technology-fueled disruptions (education, news), suburban dystopianism889 followers | Follow
Ben Rothke
Established information security professional. Senior Security Consultant, BT Global Services. Writer & author of security books/articles751 followers | Follow
Christopher Soghoian
Security and Privacy Researcher (opinions expressed are my own and not official policy of any org)727 followers | Follow
Brett Hardin
Interested in Startups and Information Security. Previously a Penetration Tester now a Product Manager.603 followers | Follow
Peter Hesse
Father of three, computer geek, information security guru, small business owner/operator, and *very* blessed by friends, family, and career.587 followers | Follow
Peter Gregory, CISSP
Best selling tech author (22 books), speaker, instructor. Visit Amazon for books on disaster planning, CISA & CISSP exam prep books. Opinions my own.527 followers | Follow
Sam Masiello
Online Security Expert for MX Logic (now McAfee). I share breaking news and my opinions in Information Security and on the McAfee Labs blog.440 followers | Follow
Danny Lieberman
Managing Partner, Software Associates. Practical, cost-effective security for hi-tech firms. Physicist, serious musician and bike rider. JP Big Band contractor336 followers | Follow
AdrianLane
302 followers | Follow
Hart Rossman
Home: Family, Travel, Outdoors, Climb, Bike, Run, Camp, Circus Skills. Work: CTO Cyber Security @ SAIC, Tech & Innovation267 followers | Follow
Kevin Beaver
Independent Information Security Consultant, Expert Witness, Speaker, Author, Libertarian266 followers | Follow
Philip James
Network/Info Security for a living, technology geek for fun and a dad for life. CCIE#19950-Security/ NAC/Endpint/Virt Security Evangelist. Living Kidney Donor240 followers | Follow
Tom Smedinghoff
Information law attorney; focused on privacy, data security, identity management, and e-transaction issues141 followers | Follow
Patrick McCanna
Security Architect @ AT&T; Mobility. I work with tiny devices and global networks.140 followers | Follow
Secret CSO
Chief Security Officer (CSO) for a Fortune-500 company in the NYC area.64 followers | Follow
Ramon Krikken
Analyst @ Burton Group - focus areas: software security, cryptography, security analytics, data masking, impact on cloud computing security, and metrics, too!44 followers | Follow
Recommendations
List curators: Please login with your Twitter oAuth account to accept or reject recommendations.
1
vote
vote
Recommend someone for this list
A-List Lists
Very Follow-Worthy Lists
Newest
Email Updates
Get updates about new lists on Twitter and news about Listorious
about
Listorious makes it easy to find who matters on any topic with the best Twitter people search on the web.
a list of other things
search
A Sawhorse Media Production.














































































