

How to Build Your Own Payment Gateway
Whether you're a merchant looking to cut down on payment service fees, a startup aiming to provide solutions to an underserved region, or an online business battling...

5 Ways to Use Payment Analytics & Insights to Grow Your Business
What are Payment Analytics? Payment analytics are actionable trends organizations can identify and use to tune and accelerate their business growth. In today’s numbe...

May 2023 Product Changelog
We've been working hard this spring to provide more control, flexibility, and security to improve your data management and user experience. Our latest updates includ...

Securely Transitioning Your Credit Card Data: Migrating Data to Basis Theory
Introduction When migrating credit card data from a payment service provider (PSP) to Basis Theory, you would extract all stored card data and personally identifiabl...

5 Ways Payment Automation Can Improve Your Workflows
What is Payment Automation? When we think about payment automation, the temptation is to think only about inbound payment - revenue, in other words. And, indeed, mak...

How to Accept Multiple Payment Methods Securely
In today’s payment landscape, the emergence of new technologies gives consumers more payment options than ever before. As a merchant, it’s vital to accept the forms ...

Payment Metrics Decoded: Harnessing the Power of Payment Data
Merchants have access to a wealth of data points to gauge the health and success of their business. From customer acquisition cost to profit margin, the array of ava...

April 2023 Changelog
One of the most exciting parts of working at Basis Theory is encountering the various unique scenarios and alternative use cases that our customers envision. While s...

4 Best Practices for Secure Online Payment Processing
Merchants who build any kind of payment system must manage payments securely for a range of reasons.

What You Should Know About PCI Violations
PCI-DSS is a detailed and complex security standard that any entity involved in credit card payments must adhere to. Broadly speaking, its purpose is to ensure that ...

The Key to E-commerce Profitability: Multi-processor Payment Routing
When a payment is ready to be processed, most merchants cannot simply send it to the card network - instead they must work with a Payment Service Provider (PSP). The...

What you should know about PCI-DSS automation
PCI-DSS (Payment Card Industry Data Security Standard) is an information security standard that must be adhered to by any organization whose involvement in the proce...

How to Collect Credit Cards Over the Phone Without Becoming PCI Compliant
Modern consumers often prefer to transact business digitally, but there are still times when they would rather speak to a live person. For many vendors this raises t...

March 2023 Product Changelog
We are thrilled to share some of the key updates we've made to our platform during the month of March.

Rethinking Corporate Risk Management: Evolution, Roles, and Best Practices
Clients that have experienced claims typically have a greater appreciation of how catastrophic and frustrating a claim can be without strong risk management partners...

Is Your Payment Provider Holding You Back?
Recently, I had the pleasure of joining Caleb Avery, CEO of Tilled, on a webinar to discuss the current state of payments and data ownership. Tilled is one of our am...

What is a Card Network Token?
A card network token is a string of random numbers that is used to retrieve the real Primary Account Number (PAN) from a token value, where it is securely stored to ...

Protecting PHI and All Your Most Sensitive Data
We frequently mention that security is in our DNA, and we mean it.

Test Credit and Debit Card Numbers: Frequently Asked Questions
Why test credit and debit card transactions? When you build a payment transaction system, it’s important to ensure that it is working properly.

What is payment network tokenization?
Payment network tokenization is a process of replacing sensitive payment information, such as a credit card number, with a unique identifier or token that can be use...

Upcoming Changes in PCI DSS 4.0: What SaaS Platforms Need to Know
The Payment Card Industry Data Security Standard (PCI DSS) is the global standard for ensuring the secure handling of credit card data. It’s designed to protect card...

Reveal: Unlock Unmistakable User Experiences with Sensitive Data
We launched Basis Theory Elements late last year to provide developers and designers a fast, dynamic, and secure option to seamlessly collect information from within...

February 2023 Changelog
After the numerous improvements the team released in January, we spent February heads down on a few initiatives to make progress toward developing a more complete pl...

Webinar: Simplify PCI compliance with Basis Theory & Secureframe
In this Secureframe webinar, we discuss how tokenization and automation can eliminate 95% of the time and effort involved with PCI compliance.

What is a Third-Party Tokenization Service Provider?
In short, a third-party tokenization service provider provides services for creating, storing, and managing tokens to improve data security.

An Introduction to Token Vaults
Today’s digital landscape can be hazardous for online vendors seeking to provide simple, yet fully secure, payments. Perhaps the trickiest element of securing online...

What to do if your PSP Shuts Down Your Account
Payment service providers (PSPs) play a critical role in ensuring smooth and secure payment processing for a variety of merchants but they can pose a significant ris...

What are Encryption and Tokenization?
Encryption and tokenization are complementary strategic tools used by systems that need to protect sensitive information, especially in the realm of secure payments ...

What are Cascading Payments?
Cascading payments can be part of an intelligent payment routing strategy. In this post, we break down the details and discuss how they can influence your success ra...

What is Sensitive Authentication Data?
Learn about sensitive authentication data (SAD), like CVV and CVC, how it works, and why you likely can’t store it.

Changelog: January 2023
Learn more about January's releases, improvements, and fixes.

How to reduce PCI DSS Scope: An overview
Understanding PCI scope is the first step to reducing it. Get the basics and learn how to reduce scope by as much as 93%.

What is a Card-on-File Transaction and what is it used for?
In this guide, we’ll review how card-on-file transactions work, examples of where they can be used, and benefits and drawbacks.

What are the PCI DSS’ ROC, SAQ, and AOC?
Everything you need to know about PCI DSS’ self-assessment questionnaires, Report on Compliance, an Attestation of Compliance.

Storing Credit Cards: Outsource a Solution, or Build?
Learn the core concepts, efforts, and trade-offs between building or buying a cardholder data environment (CDE).

How to Store Credit Cards: Building in-house
Get a high-level overview of the effort and trade-offs required to build your own cardholder data environment (CDE).

How to store credit cards: Using PCI DSS Service Providers
Whether you’re looking to simply accept credit cards in-app or do something more complex, like split payments or multi-processor routing, understanding the level of ...

A helpful guide on Cardholder Data Environments (CDEs)
In the last couple of years, new and emerging business models, requirements, and workflows have forced companies to seek new ways to leverage this sensitive data mor...

Changelog: December 2022
The Highlights New Year, New Documentation We’ve learned and changed a lot over the last year, but we realized our documentation hadn’t. Over the previous two years,...

Is the Customized Approach in PCI DSS 4.0 right for me?
What is a “Customized Approach”? Historically, PCI DSS has published a defined approach to implementing the required security controls. The standard outlined the com...

Formjacking and PCI 4.0: What it is and why you should care
What is Formjacking? Also known as web skimming, e-skimming, or a magecart attack, formjacking is a technique that allows hackers to spy and capture sensitive data, ...

When is PCI DSS 4.0 required? Timing and helpful considerations
Find out when you must be compliant with PCI DSS 4 and which factors are most likely to impact your transition’s timeline.

What is pseudonymization? Simple definition, benefits and comparisons
Pseudonymization is one of several techniques by which an organization can remove this identifying information and operationalize data while providing both privacy a...

Changelog: November 2022
The Highlights Upgrades to Elements Collect data with Android and iOS Elements The new SDKs make it simple to collect Text data directly from Android and iOS mobile ...

What is PCI Compliance? The 12 Requirements & PCI DSS Guide
While frustrating to many, it’s hard to argue the role PCI compliance has played in creating today’s digital economy. By outlining, defining, and enforcing standards...

Getting to compliance: Breaking down the 2022 Nacha Data Protection Requirements
Nacha, the governing and enforcement body for United State’s ACH network, recently issued rules requiring organizations to employ a combination of encryption and tok...

Using React to Customize Your Auth0 User Experience
As our implementation with Auth0’s branding and styling grew more complex, our engineering team looked for a solution to simplify our implementation and accelerate o...

Changelog: October 2022
The Highlights Access Rules Engineers use, scope, and permission our Tokens in various ways. To allow for greater control over access to tokens, we built Access Rule...

Introducing the PCI Blueprint
The more control and access organizations have over their data, the faster they can ship, innovate, and react. But, because of the burdens that come with PCI, we’ve ...

What You Should Know About PCI Compliance And Email Security
Basis Theory’s Take Long story short: PCI compliance is exceptionally difficult to maintain if you want to use email to share any kind of PII. And doing so will requ...