Rob Stubbs

Rob Stubbs is an experienced professional within the global cybersecurity industry. He has over 17 years of experience in cybersecurity, spanning both the commercial and defence sectors, with a particular focus on cryptography, key management and encryption of data at rest and in motion. Rob has participated in technical working groups for the UK Crypto Developers Forum and Common Criteria Users Forum, and has significant experience with the FIPS, Common Criteria and PCI product certification schemes, as well as with UK, US and NATO assurance schemes for the protection of classified information up to TOP SECRET. Starting his career with a hi-tech start-up in 1984, Rob has held Director-level roles in engineering, product management, operations and sales & marketing. Having previously worked for two of the leading hardware security module (HSM) vendors, he is currently Sales Director at Cryptomathic, a software security company headquartered in Denmark that specialises in mission-critical security solutions for the banking and financial industry. Based at their Cambridge, UK office, Rob’s responsibility includes major clients across Europe, Middle East, Africa and SE Asia.

Classification-cryptpgrapjic-keys

5 min read

Classification of Cryptographic Keys

This article is meant to be an introduction to the different types of cryptographic keys that are used to protect digital applications in encryption...

Read More
Achieving Agile Cryptography Management with Crypto Service Gateway

3 min read

Achieving Agile Cryptography Management with Crypto Service Gateway (CSG)

Cryptomathic's Crypto Service Gateway (CSG) helps you realize business-agile and efficient crypto services, with central control of security policy...

Read More
38526157131_3fa8f990df_k

7 min read

Cryptographic Key Management - the Risks and Mitigation

With the growing need for cryptography solutions to protect digital assets and communications, the ever-present security holes in modern computer...

Read More
HSMs-in-Cryptography-Cryptomathic-1

5 min read

Turning Cryptography into a Service - Part 2

Part 2 – Accelerating Time-to-Market With the increase in e-commerce and electronic communications on the one hand and the growing challenges of...

Read More
Spectre-Meltdown

2 min read

Meltdown & Spectre – What you Need to Know about Protecting your Keys

A number of serious security vulnerabilities, collectively known under the names of “Meltdown” and “Spectre” [1][2], have recently been discovered in...

Read More
How to Improve HSM Usability ?

2 min read

How to Improve HSM Usability

In this article, we will explore some of the reasons why HSMs can be difficult to use and look at a novel solution that helps to overcome these...

Read More
your-own.key-Cryptomathic-infosec-key-management

2 min read

Key Management – A Question of Ownership

This article looks at the problems associated with key management that are common in many businesses today, where there is no clear ownership; then...

Read More
Symmetric Encryption Algorithms - Their Strengths and Weaknesses, and the Need for Crypto-Agility

5 min read

Symmetric Encryption Algorithms And The Need For Crypto-Agility

In this second installment of a three-part series on symmetric key encryption technology, we look at the evolution of symmetric key encryption...

Read More
The Use of Encryption Modes with Symmetric Block Ciphers

3 min read

The Use of Encryption Modes with Symmetric Block Ciphers

In this final article in a 3-part series on symmetric key encryption technology, we look at the use of encryption modes with symmetric block ciphers,...

Read More