Bessemer's web site has a good overview of our data security practice. Meanwhile, here are my most popular blog posts on data security:

June 3, 2013
HACK Won't Always Be a Four-Letter Word

The U.S. has to stop demonizing and imprisoning our best cyber talent in order to protect our national security interests.
February 26, 2014
My rules for predicting cybersecurity trends: 1) follow the money, and 2) never under-estimate motivated hackers.

November 5, 2013
The Internet's Neighborhood Watch
It's time for enterprises and government to heed the President's call to collaborate in their cyber defense through real-time sharing of cyber-incident data.

August 28, 2013
The Coming Wave of Cloud Security Startups
As the largest IT platform shift ever, cloud computing is re-shaping the cyber-security landscape. The opportunities for entrepreneurs are vast. (Reprinted from MIT Technology Review.)

March 30, 2011
Ralph Langner: America is a Cyber Bully
The security researcher who published the inner workings of the Stuxnet computer worm points his finger at America. He should be pointing it at himself.

Aug. 29, 2008
Internet Threat Level Red
Dan Kaminsky warns DEFCON that half the internet remains completely exposed to a gaping hole in the Domain Name System that lets phishers divert web and email traffic at will.

July 13, 2005
Too Many Security Startups?
A night out at the movies demonstrates how easily hackers adapt.

Oct. 15, 2009
The Fallacy of the Fallacy of Identity Theft
When a Wall St. Journal column recklessly dismisses Identity Theft as a hoax, the victims speak up.

May 24, 2008
An Open Letter to Ron Lieber
Experian lies about Lifelock, and fools the New York Times.

Nov. 18, 2006
Preventing Identity Theft
The brittle secret of U.S. social security numbers has cracked.

Sept. 16, 2009
Physical Encryption: The Ultimate ID Theft Defense
My father teaches my son the Sledgehammer Algorithm, an asymmetrical encryption protocol.

October 9, 2007

SaaSy Security Suits SMB
Small businesses are now forced to play security catch up, but with fewer or no IT professionals, ease of deployment and integration trump best-of-breed technology.

August 10, 2007
As a guest on Talk of the Nation, I predict that we'll soon find ourselves drowning in SPIT.

Sept 11, 2009
Security icon Ron Rivest looks to Tilera's 64-core machine to run his latest cryptographic algorithm MD6.

March 12, 2008
Red Herring Interview on Security and VC Blogging

July 14, 2005
Doomsday Hackers and Evildoing Robots
Security myths that banks succumb to, and why out-of-band authentication of transactions offers the best hope of restoring online trust.

March 29, 2006
Cat and Mouse

Will the cat and mouse game between hackers and security researchers persist forever?

Aug. 1, 2005
CiscoGate at DEFCON
Cisco makes the mistake of trying to hide the first major vulnerability discovered in its IOS.

Oct. 5, 2007

There Once Was A Founder Named Scott...
A marriage toast for Postini and Google.

Nov. 2, 2006
British Telecom Dials Up Da Vinci Code
BT acquires Counterpane, and Europe goes ga-ga for Bruce Schneier.

July 17, 2005
My Security Anti-Road Map
How I try to avoid failing startups in data security.

Dec. 19, 2005
Profiling: New Approach to Desktop Security
Transparency is wonderful but overloading users with information leads to WORSE security. Warning: Exception Fault 1002F4E, Stack Overwritten. OK?