Rob Stubbs

Rob Stubbs is an experienced professional within the global cybersecurity industry. He has over 17 years of experience in cybersecurity, spanning both the commercial and defence sectors, with a particular focus on cryptography, key management and encryption of data at rest and in motion. Rob has participated in technical working groups for the UK Crypto Developers Forum and Common Criteria Users Forum, and has significant experience with the FIPS, Common Criteria and PCI product certification schemes, as well as with UK, US and NATO assurance schemes for the protection of classified information up to TOP SECRET. Starting his career with a hi-tech start-up in 1984, Rob has held Director-level roles in engineering, product management, operations and sales & marketing. Having previously worked for two of the leading hardware security module (HSM) vendors, he is currently Sales Director at Cryptomathic, a software security company headquartered in Denmark that specialises in mission-critical security solutions for the banking and financial industry. Based at their Cambridge, UK office, Rob’s responsibility includes major clients across Europe, Middle East, Africa and SE Asia.

Cryptography – The Next 10 Years (Part 3)

In this final part of the series, we look at how cloud computing will impact the use of cryptography and at the future of HSMs; and finally, we reflect on what you can do to be ready for the advances in cryptography that lie ahead.

Read more

Cryptography – The Next 10 Years (Part 2)

As part 2 of this 3-part series, here we look at new applications such as blockchain and IoT, as well as the impact of quantum technology.

Read more

Cryptography – The Next 10 Years (Part 1)

Cryptography has come a long way since ancient times, and the pace of development has been especially quick over the last 2 decades. Indeed, many fundamental aspects of our modern world – finance, communications, e-commerce, national security – are built on the bedrock of cryptography.

Read more

Cryptographic Key Management - the Risks and Mitigation

With the increasing dependence on cryptography to protect digital assets and communications, the ever-present vulnerabilities in modern computing systems, and the growing sophistication of cyber attacks, it has never been more important, nor more challenging, to keep your cryptographic keys safe and secure. A single compromised key could lead to a massive data breach with the consequential reputational damage, punitive regulatory fines and loss of investor and customer confidence.

Read more

Quantum Computing and its Impact on Cryptography

“Quantum computing” is computation performed using a computing device based on the strange, counter-intuitive physical properties of matter at very small scale, known as quantum mechanics.

Read more

Buyer’s Guide to Choosing a Crypto Key Management System - Part 3

Part 3: Choosing the Right Key Management System

In this concluding part, we will examine the business case for introducing a new key management system and define 20 criteria to help you select the optimal solution for both your current and future needs.

Read more

Buyer’s Guide to Choosing a Crypto Key Management System - Part 2

Part 2: The Requirement for a Key Management System

In Part 1of this three-part article, we introduced the concept of key management and the functions and benefits of a key management system. In this part, we will consider how the requirement for a new key management system arises and then explore the underlying business drivers and benefits of such a system in each scenario.

Read more

Buyer’s Guide to Choosing a Crypto Key Management System - Part 1

Part 1: What is a Key Management System?

In this, the first part of a three-part article, we start off by looking at what key management is, the function of a key management system and the benefits it provides.

Read more

Classification of Cryptographic Keys

This article is intended as a primer on the classification of cryptographic keys used for securing digital applications.

Read more