Three Approaches to IoT Security: Part Two

Three Approaches to IoT Security: Part Two

There is no single path to securing mobile devices and networks. This article, the second in our three-part series, focuses on how one startup company is leveraging blockchain technology and a type of cryptography called telehash.