How Modern Life Protects PII with the Flexibility of Basis Theory
The team at Modern Life has created a tech-enabled insurance brokerage that gives advisers tools and expert advice to serve their clients. The CTO, Jack Arenas, want...
Insights and updates from the Basis Theory team
The team at Modern Life has created a tech-enabled insurance brokerage that gives advisers tools and expert advice to serve their clients. The CTO, Jack Arenas, want...
Payment network tokenization is a process of replacing sensitive payment information, such as a credit card number, with a unique identifier or token that can be use...
The Payment Card Industry Data Security Standard (PCI DSS) is the global standard for ensuring the secure handling of credit card data. It’s designed to protect card...
We launched Basis Theory Elements late last year to provide developers and designers a fast, dynamic, and secure option to seamlessly collect information from within...
After the numerous improvements the team released in January, we spent February heads down on a few initiatives to make progress toward developing a more complete pl...
In this Secureframe webinar, we discuss how tokenization and automation can eliminate 95% of the time and effort involved with PCI compliance.
In short, a third-party tokenization service provider provides services for creating, storing, and managing tokens to improve data security.
At its core, payments optimization focuses on streamlining the way businesses accept, process and manage payments to improve customer experience and cut costs. It st...
Today’s digital landscape can be hazardous for online vendors seeking to provide simple, yet fully secure, payments. Perhaps the trickiest element of securing online...
Payment service providers (PSPs) play a critical role in ensuring smooth and secure payment processing for a variety of merchants but they can pose a significant ris...
Encryption and tokenization are complementary strategic tools used by systems that need to protect sensitive information, especially in the realm of secure payments ...
Patrick Zhang, the tech lead at Passes, found himself scrambling at two in the morning to integrate a new payment service provider (PSP) after the one they were usin...
Cascading payments can be part of an intelligent payment routing strategy. In this post, we break down the details and discuss how they can influence your success ra...
Credit card tokenization is an advanced data security technique designed to protect sensitive cardholder data from being accessed through potential security breaches...
Learn the meaning behind the different parts found on a credit card, as well as their function and relevant PCI DSS requirements, with this overview and FAQ.
Learn about sensitive authentication data (SAD), like CVV and CVC, how it works, and why you likely can’t store it.
Learn more about January's releases, improvements, and fixes.
What is Branch? Branch provides consumers with affordable and personalized insurance policies in seconds.
Understanding PCI scope is the first step to reducing it. Get the basics and learn how to reduce scope by as much as 93%.
Understanding the different PCI merchant levels is the first step to reducing the challenges they might bring to your organization.
In this guide, we’ll review how card-on-file transactions work, examples of where they can be used, and benefits and drawbacks.
Whether you’re building or optimizing your payment stack, now is the time to think about a multiple-payment gateway strategy.
Everything you need to know about PCI DSS’ self-assessment questionnaires, Report on Compliance, an Attestation of Compliance.
Learn the core concepts, efforts, and trade-offs between building or buying a cardholder data environment (CDE).
Get a high-level overview of the effort and trade-offs required to build your own cardholder data environment (CDE).
Whether you’re looking to simply accept credit cards in-app or do something more complex, like split payments or multi-processor routing, understanding the level of ...
In the last couple of years, new and emerging business models, requirements, and workflows have forced companies to seek new ways to leverage this sensitive data mor...
The Highlights New Year, New Documentation We’ve learned and changed a lot over the last year, but we realized our documentation hadn’t. Over the previous two years,...
What is a “Customized Approach”? Historically, PCI DSS has published a defined approach to implementing the required security controls. The standard outlined the com...
What is Formjacking? Also known as web skimming, e-skimming, or a magecart attack, formjacking is a technique that allows hackers to spy and capture sensitive data, ...
Find out when you must be compliant with PCI DSS 4 and which factors are most likely to impact your transition’s timeline.
Pseudonymization is one of several techniques by which an organization can remove this identifying information and operationalize data while providing both privacy a...
The Highlights Upgrades to Elements Collect data with Android and iOS Elements The new SDKs make it simple to collect Text data directly from Android and iOS mobile ...
While frustrating to many, it’s hard to argue the role PCI compliance has played in creating today’s digital economy. By outlining, defining, and enforcing standards...
If your business stores, processes, or transmits cardholder data from at least one of the leading card networks (e.g. Visa, Mastercard, etc.), then you must prove Pa...
As our implementation with Auth0’s branding and styling grew more complex, our engineering team looked for a solution to simplify our implementation and accelerate o...
The Highlights Access Rules Engineers use, scope, and permission our Tokens in various ways. To allow for greater control over access to tokens, we built Access Rule...
What is data masking? Data masking is the process of hiding elements of an original value, while still keeping enough context for the string to make sense to the use...
The more control and access organizations have over their data, the faster they can ship, innovate, and react. But, because of the burdens that come with PCI, we’ve ...
Basis Theory’s Take Long story short: PCI compliance is exceptionally difficult to maintain if you want to use email to share any kind of PII. And doing so will requ...
When we started designing Basis Theory's vault, we knew the platform encryption posture would need to change to meet new security, compliance, and customer requireme...
Elements provide modern building blocks for collecting sensitive information in your UI, allowing developers to build immersive forms that match the look and feel of...
Did you know that the first 4-8 numbers on a payment card, known as the BIN (Bank Identification Number), actually have a specific meaning and purpose? In order to p...
A data tokenization platform supports zero trust architecture practices without losing your ability to interact with and use the tokenized data. For example, Basis T...
According to the Economic Times, India has the highest fintech adoption rate globally at 87%—13% higher than the global average. It’s also one of the fastest growing...
The Highlights Updating Elements with Refs To stay consistent with the current React trends, targeting Elements now uses Refs just like any other React element in a ...
Learn how one early-stage company is using Basis Theory to help its customers build their ideal payment workflows and avoid PCI compliance scope.
With the right policies, strategies, and tools, your data remediation program can keep your sensitive data compliant, secure, and useful.
Every day, businesses accumulate more data to help drive their decisions and understand their market. That data is not only confidential to the business, but often c...
Leading up to our GA release in late April, we wondered what life would be like post-launch. Even if we felt we had the best platform, would others? After all, token...