Webinar: Why use tokenization to secure ACH data?
In this conversation, Nacha and Basis Theory break down the new data security requirements defined by Nacha and how data tokenization can help you secure ACH data. A...
Changelog: June 2022
The Highlights Capture individual card data with separate fields using Elements Developers want more control over their user experience when collecting credit or deb...
Elements: A seamless way to capture, secure, and tokenize data
An application can only rise as high as the level of trust provided by its users. Keeping data safe and secure is one of the most important ways to do that, but tack...
Key insights: 3 Drivers and Benefits of Data Tokenization Platforms
Making data tokenization accessible Tokenization provides a simple way to secure and use sensitive data, but swapping the social security numbers sitting in your dat...
Data tokenization and encryption using Go
There are an estimated 1.1 million Go developers today, making Go one of the top 10 languages in the world. The 2021 StackOverflow Developer Survey shows it’s one of...
How to implement KYC using data tokenization
Know Your Customer (KYC) solution providers, like Alloy, help financial services and institutions verify a user’s identity by checking their Personally Identifiable ...
Why I Joined Basis Theory
I have had a front seat to the origins of companies that shaped the world we live in today. From Uber and Doordash changing the way we travel and eat to Peloton and ...
Shipping code quickly with confidence: Security Testing
Every engineer wants to ship high-quality software systems, but the “how” isn’t always straightforward. To help, we designed a testing series, “Shipping code quickly...
Changelog: May 2022
The highlights Status Page Our new public Status Page provides developers a simple way to track the status of our API, Portal, and Elements. Check it out at https://...
Shipping code quickly with confidence: Load Testing
Every engineer wants to ship high-quality software systems, but the “how” isn’t always straightforward. To help, we designed a testing series, “Shipping code quickly...
Introducing Basis Theory Labs
At Basis Theory, we find “building in public” and open-source to provide some of the best feedback loops for our product. It’s why we’ve opened and shared our Azure ...
Shipping code quickly with confidence: Synthetic Testing
Every engineer wants to ship high-quality software systems, but the “how” isn’t always straightforward. To help, we designed a testing series, “Shipping code quickly...
Shipping code quickly with confidence: UI Acceptance and End-to-End Testing
Every engineer wants to ship high-quality software systems, but the “how” isn’t always straightforward. To help, we designed a testing series, “Shipping code quickly...
Shipping code quickly with confidence: API Acceptance and Integration Testing
Every engineer wants to ship high-quality software systems, but the “how” isn’t always straightforward. To help, we designed a testing series, “Shipping code quickly...
Shipping code quickly with confidence: Testing layers and principles
Every engineer wants to ship high-quality software systems, but the “how” isn’t always straightforward. To help, we designed a testing series, “Shipping code quickly...
Introducing the Basis Theory Terraform Provider
Read this overview for more information on how to manage your Basis Theory resources using Terraform.
Introducing sendsecure.ly—a free and safe way to share your secrets
Do you need to share a password to your Netflix Amazon, Hulu, or Disney+ account with household members or roommates but don’t want this sensitive information in the...
Simpler way to secure data with Ruby and Basis Theory
Ruby on Rails built its reputation on its ease of use and simplicity. As an engineer, I look for ways to remove the complexity of encrypting and securing data within...
Data Security is a Developer Service Problem
In 2011, Gabe Newell described software piracy “as a service problem.” His comment implied that until there was a better experience from a legitimate service, consum...
What are Reactors and Reactor Formulas?
What challenges do Reactors solve? Processing, analyzing, and sharing (i.e., “using”) your sensitive data brings additional challenges to development outside of mere...
What is Basis Theory’s Proxy?
What is the Proxy? Tokenizing your data is only the first step. Once your data is safe and secure in your vault, you need to use that data in a meaningful way. The B...
Using Developer Tenants with Basis Theory
A Tenant is the first thing you create after you sign up for Basis Theory, providing the foundation for managing your token infrastructure. Need a dedicated testing ...
Secure Sensitive Data in Five Lines of Code
In the event of a security breach, this data may result in a loss of sales, revenue, or reputation for the company. As a result, it becomes critical that an applicat...
Centralizing Operational Secrets with Ansible
Centralizing Operational Secrets Secrets are sensitive values, such as passwords, keys, and certificates, that must be shared across multiple systems—from applicatio...
Tokenization for robotic process automation
Robotic Process Automation, or RPA, is a rapidly evolving space expected to grow at more than 32 percent a year through 2028. By combining intelligent software robot...
Transforming a search query into an EF expression with Lucene
Our task Let’s say we’re a food delivery app running a special promotion for two groups: anyone whose first name is Bob, or anyone whose favorite food is steak. Ulti...
How to Tokenize Bank Account Numbers
This piece covers how to tokenize bank account numbers to securely protect bank account information.
The three questions to ask when securing ACH bank account numbers
In our last post, we gave a high-level explanation of ACH’s requirements for electronically storing financial deposit information (i.e., bank account numbers) and wh...
Encrypting data in React applications with Basis Theory
Challenges with encrypting, securing, and maintaining sensitive data—like card numbers, social security numbers, API keys, and bank account numbers—tend to compound ...
Breaking down Nacha’s ACH supplemental security requirements for data at rest
Nacha now requires that account numbers must be “unreadable when stored electronically.” The implementation of this rule is broken into two phases.
Basis Theory presents at V-Sum Nine
I want to give a huge shout out to the V-Sum (Value Summit) team for their fantastic event, and also give a sincere thank you for enabling us to participate this yea...
Why Kindred Ventures backed Basis Theory
I distinctly remember my very first conversation with Kanyi Maqubela of Kindred Ventures nearly a year ago. “So are you disrupting the entire payment processing indu...
Beta: Day One
Over the past 7 months, we’ve built a world class team across the board, and across multiple countries (shout out to our friends in South America). We've never been ...
Introduction to Basis Theory
On behalf of the organization, I'm excited to talk publicly for the first time about Basis Theory. We'll be pushing more content soon.