Data security 101: Remediating sensitive data
With the right policies, strategies, and tools, your data remediation program can keep your sensitive data compliant, secure, and useful.
Insights and updates from the Basis Theory team
With the right policies, strategies, and tools, your data remediation program can keep your sensitive data compliant, secure, and useful.
Every day, businesses accumulate more data to help drive their decisions and understand their market. That data is not only confidential to the business, but often c...
Leading up to our GA release in late April, we wondered what life would be like post-launch. Even if we felt we had the best platform, would others? After all, token...
The Highlights Token expiration Whether mandated by PCI or by your organization's internal data retention policies, developers need the ability to purge data automat...
Tokenization is only valuable to an organization if the tokens are useful. While cookie-cutter tokens with rigid properties provide great guardrails to get up-and-ru...
Data Tokenization FAQs What is tokenization? Tokenization refers to the process of generating a digital identifier, called a token, to reference an original value. S...
In this conversation, Nacha and Basis Theory break down the new data security requirements defined by Nacha and how data tokenization can help you secure ACH data. A...
The Highlights Capture individual card data with separate fields using Elements Developers want more control over their user experience when collecting credit or deb...
An application can only rise as high as the level of trust provided by its users. Keeping data safe and secure is one of the most important ways to do that, but tack...
Making data tokenization accessible Tokenization provides a simple way to secure and use sensitive data, but swapping the social security numbers sitting in your dat...
In the early 2000s, the Payment Card Industry (PCI) introduced its Data Security Standard (PCI DSS). Today, the framework outlines 12 requirements that card-acceptin...
There are an estimated 1.1 million Go developers today, making Go one of the top 10 languages in the world. The 2021 StackOverflow Developer Survey shows it’s one of...
Know Your Customer (KYC) solution providers, like Alloy, help financial services and institutions verify a user’s identity by checking their Personally Identifiable ...
I have had a front seat to the origins of companies that shaped the world we live in today. From Uber and Doordash changing the way we travel and eat to Peloton and ...
Every engineer wants to ship high-quality software systems, but the “how” isn’t always straightforward. To help, we designed a testing series, “Shipping code quickly...
The highlights Status Page Our new public Status Page provides developers a simple way to track the status of our API, Portal, and Elements. Check it out at https://...
Every engineer wants to ship high-quality software systems, but the “how” isn’t always straightforward. To help, we designed a testing series, “Shipping code quickly...
At Basis Theory, we find “building in public” and open-source to provide some of the best feedback loops for our product. It’s why we’ve opened and shared our Azure ...
Every engineer wants to ship high-quality software systems, but the “how” isn’t always straightforward. To help, we designed a testing series, “Shipping code quickly...
Every engineer wants to ship high-quality software systems, but the “how” isn’t always straightforward. To help, we designed a testing series, “Shipping code quickly...
Every engineer wants to ship high-quality software systems, but the “how” isn’t always straightforward. To help, we designed a testing series, “Shipping code quickly...
Every engineer wants to ship high-quality software systems, but the “how” isn’t always straightforward. To help, we designed a testing series, “Shipping code quickly...
Read this overview for more information on how to manage your Basis Theory resources using Terraform.
Do you need to share a password to your Netflix Amazon, Hulu, or Disney+ account with household members or roommates but don’t want this sensitive information in the...
Ruby on Rails built its reputation on its ease of use and simplicity. As an engineer, I look for ways to remove the complexity of encrypting and securing data within...
In 2011, Gabe Newell described software piracy “as a service problem.” His comment implied that until there was a better experience from a legitimate service, consum...
What challenges do Reactors solve? Processing, analyzing, and sharing (i.e., “using”) your sensitive data brings additional challenges to development outside of mere...
What is the Proxy? Tokenizing your data is only the first step. Once your data is safe and secure in your vault, you need to use that data in a meaningful way. The B...
A Tenant is the first thing you create after you sign up for Basis Theory, providing the foundation for managing your token infrastructure. Need a dedicated testing ...
In the event of a security breach, this data may result in a loss of sales, revenue, or reputation for the company. As a result, it becomes critical that an applicat...
Centralizing Operational Secrets Secrets are sensitive values, such as passwords, keys, and certificates, that must be shared across multiple systems—from applicatio...
Robotic Process Automation, or RPA, is a rapidly evolving space expected to grow at more than 32 percent a year through 2028. By combining intelligent software robot...
Historically, security has been treated as a featureless and burdensome but necessary expense incurred by organizations. Tokenization, however, has reframed the conv...
Our task Let’s say we’re a food delivery app running a special promotion for two groups: anyone whose first name is Bob, or anyone whose favorite food is steak. Ulti...
This piece covers how to tokenize bank account numbers to securely protect bank account information.
In our last post, we gave a high-level explanation of ACH’s requirements for electronically storing financial deposit information (i.e., bank account numbers) and wh...
Challenges with encrypting, securing, and maintaining sensitive data—like card numbers, social security numbers, API keys, and bank account numbers—tend to compound ...
Nacha now requires that account numbers must be “unreadable when stored electronically.” The implementation of this rule is broken into two phases.
I want to give a huge shout out to the V-Sum (Value Summit) team for their fantastic event, and also give a sincere thank you for enabling us to participate this yea...
I distinctly remember my very first conversation with Kanyi Maqubela of Kindred Ventures nearly a year ago. “So are you disrupting the entire payment processing indu...
Over the past 7 months, we’ve built a world class team across the board, and across multiple countries (shout out to our friends in South America). We've never been ...
On behalf of the organization, I'm excited to talk publicly for the first time about Basis Theory. We'll be pushing more content soon.