Since Backbone Security's incorporation in 2000, organizations of all types and sizes have turned to Backbone Security to meet compliance requirements and manage information security risk.  Backbone Security looks forward to listening to your needs and providing you with cost-effective security and compliance services that are an outstanding value for your organization.

Backbone Security is home of the Steganography Analysis and Research Center (SARC), the global leader in digital steganalysis.  The SARC has established the world's largest commercially available repository of digital steganography applications, fingerprints, and signatures and has developed industry leading tools and appliances for detecting and extracting information hidden with digital steganography applications.  Backbone is also an Approved Scan Vendor (ASV) certified by the Payment Card Industry (PCI) Security Standards Council (SSC) to conduct external PCI vulnerability scans with a one-stop scanning solution.


Latest News
DSD Laboratories, Inc. Selected as a Prime Contractor on a $691K Payment Card Compliance Contract with USDA Forest Service
DSD will subcontract the work to its affiliate, Backbone Security.com, Inc. Read more
Backbone Security Offers Complimentary VIP Forensics Conference Registrations to Customers
Backbone Security Offers Complimentary VIP Forensics Conference Registrations to Customers Read more
Backbone Security Expands World's Largest Digital Steganography Database
Steganography Application Fingerprint Database Now Contains Over 1,225 Applications. Read more
Revision to NIST Security Controls Catalog Addresses Steganography Threat
For the very first time, the catalog contains explicit references to steganography in three separate security controls—tacit acknowledgement of the threat represented by steganography in an ever expanding threat space. Read more
Steganography and the Insider Threat: Backbone Security Explains Why the IT Security Community Should Take Notice
Whether the insider threat or the external threat is more serious has been the subject of perennial discussion ever since the concept of threats to information systems emerged. And there is no end in sight. Read more