Rob Stubbs

Rob Stubbs

Rob Stubbs is an experienced professional within the global cybersecurity industry. He has over 17 years of experience in cybersecurity, spanning both the commercial and defence sectors, with a particular focus on cryptography, key management and encryption of data at rest and in motion. Rob has participated in technical working groups for the UK Crypto Developers Forum and Common Criteria Users Forum, and has significant experience with the FIPS, Common Criteria and PCI product certification schemes, as well as with UK, US and NATO assurance schemes for the protection of classified information up to TOP SECRET. Starting his career with a hi-tech start-up in 1984, Rob has held Director-level roles in engineering, product management, operations and sales & marketing. Having previously worked for two of the leading hardware security module (HSM) vendors, he is currently Sales Director at Cryptomathic, a software security company headquartered in Denmark that specialises in mission-critical security solutions for the banking and financial industry. Based at their Cambridge, UK office, Rob’s responsibility includes major clients across Europe, Middle East, Africa and SE Asia.
Classification of Cryptographic Keys

Classification of Cryptographic Keys

This article is meant to be an introduction to the different types of cryptographic keys that are used to protect digital applications.

Cryptographic Key Management - the Risks and Mitigation

Cryptographic Key Management - the Risks and Mitigation

With the growing need for cryptography to protect digital assets and communications, the ever-present security holes in modern computer systems, and the growing sophistication of cyber attacks, it has never been more important or harder to keep your cryptographic keys safe and secure.

A single compromised key could result in a massive data breach, resulting in reputational damage, punitive regulatory fines, and a loss of investor and customer trust.

Turning Cryptography into a Service - Part 2

Turning Cryptography into a Service - Part 2

Part 2 – Accelerating Time-to-Market

 

With the increase in e-commerce and electronic communications on the one hand and the growing challenges of cybercrime and data protection regulation, on the other hand, cryptography is becoming an increasingly important business enabler.

Achieving Agile Cryptography Management with Crypto Service Gateway (CSG)

Achieving Agile Cryptography Management with Crypto Service Gateway (CSG)

Cryptomathic's Crypto Service Gateway (CSG) helps you realize business-agile and efficient crypto services, with central control of security policy and crypto hardware. In this article, we will look at some of the uses cases that address common cryptography headaches whilst generating a strong return on investment.

Symmetric Encryption Algorithms And The Need For Crypto-Agility

Symmetric Encryption Algorithms And The Need For Crypto-Agility

In this second installment of a three-part series on symmetric key encryption technology, we look at the evolution of symmetric key encryption algorithms, the variety of algorithms available today, their strengths and weaknesses, and the importance of crypto-agility.

The Use of Encryption Modes with Symmetric Block Ciphers

The Use of Encryption Modes with Symmetric Block Ciphers

In this final article in a 3-part series on symmetric key encryption technology, we look at the use of encryption modes with symmetric block ciphers, including the need for padding and initialization vectors.

An Overview of Symmetric Encryption and the Key Lifecycle

An Overview of Symmetric Encryption and the Key Lifecycle

In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two types of symmetric algorithm, and the lifecycle and management of symmetric keys.

Key Meta-Data: Why It’s Important and How to Manage It

Key Meta-Data: Why It’s Important and How to Manage It

This article explains the concept of meta-data in the context of cryptographic keys, explaining why it is used and the necessity to manage it well.

The Need for a Crypto Abstraction Layer: Achieving Greater Efficiency And Agility With HSMs

The Need for a Crypto Abstraction Layer: Achieving Greater Efficiency And Agility With HSMs

With increasingly tough security and privacy regulations, the use of cryptography is exploding in the modern enterprise. Hardware security modules (HSMs) provide the highest standard of security and compliance, but they are difficult to use and often deployed in silos, complicating compliance and hindering crypto-agility. As competitive pressures intensify, how can cryptography be turned into an enabler of business agility and digital transformation?