ReversingGlassMay 18, 2023

In this episode, Matt touches on the newfound popularity of AI in relation to software security, pointing out the concerns he has for this technology being used by both good and bad actors. 

Keep learning
• More RG: Supply Chain in Art and Life
• Blog: RSAC 23: Supply chain and AI
• Special: The State of Supply Chain Security

Episode Transcript

MATT ROSE: Hi everyone. Welcome back to another episode of ReversingGlass. I'm Matt Rose, Field CISO at ReversingLabs. Today's episode, as you can see across the board is AI and [Software Supply Chain Security]. A little bit of a recap here a couple weeks ago, I'm sure a lot of you attended RSA and every year at RSA there's a theme.

You see something over and over again in messaging and presentations and brochures and all that, and through an unofficial kind of investigation this year, AI, SSCS or software supply chain security, and SBOM seemed to be on everybody's radar this year. Everybody wanted to talk about AI for different applications, ChatGPT changing the world, blah, blah, blah, blah, blah.

But it's interesting to think about AI, SSCS and SBOMs as a kind of, entity in together. That's why this episode is entitled AI and SSCS. Just always gotta start with a little bit of humor in all my references. Whenever I hear AI, I immediately go to Skynet, if anyone's a Terminator fan, Skynet terminators took over the world, all that good stuff... AI is getting there.

We're not there yet, but I always caution people that, hey, we've already seen this foreshadowed by Terminator. Maybe we should be a little cautious with how we're using AI. And that's the point of this episode. So thinking about applications in software supply chain security or software supply chain in general associated with AI.

You can think about a couple use cases here and just these are things to think about is, anybody can now say, hey, AI platform that I like a lot: generate malware. I wanna see some malware. I'm gonna create malware. Okay, interesting. People can actually do that. And again, it's all about the data that's out there and crowdsourced.

So a developer or somebody could use it to create malware and now you have another, nefarious dude as I like to call 'em out there. The second one is developers, like the open source initiative using  AI or a AI platform, like again, ChatGPT, I'll just use that one, to write some code, hey, ChatGPT, I gotta do this stupid thing.

Write me some code in Python or whatever it is, or write me some code in C Sharp. And you get a little piece of uh, application. But again, where is that data coming from? So a developer using it to write code that they will put into a production application concerns me with supply chain security risk because again, they're using that to generate code and that source of wherever that code created is unknown. Not everybody understands an application. You still don't know where the Chat GPT or other AI type of platform is using it. So developers using that is very dangerous. And then the third area to really think about is people creating content.

Again, there's a Nvidia just released a platform called NEMO Guardrails around access to data or what an AI solution could be. I think this is a really important step in to say, okay, I'd like to use a AI platform for correlation of results or generating a job description.

I have a friend that does that. But really when you put your data into a AI platform to create something, you may be compromising company secrets. You may be compromising customer data 'cause you're saying, hey, here's all this data. Create me something interesting. So it's another lens of risk within the supply chain that if you're using this to create something that you put into your product, it may be that disassociative path of information getting in, in an unanticipated way. So again, big topic at RSA, AI and SSCS. There's a bunch of things coming out on how AI can be used in application security or security in general. There's good applications, but there's always questions about using it in ways that circumvent the protections that you're focusing on for your software supply chain security initiatives.

I'm Matt Rose, Field CISO, ReversingLabs. Hope you enjoyed this episode of ReversingGlass. Have a great day.

FacebookFacebookXX / TwitterLinkedInLinkedInbluesky

Field CISO at ReversingLabs. Matt Rose has an extensive background in application security, object-oriented programming, multi-tier architecture design and implementation, and internet/intranet development. His areas of expertise include Application Security, SAST, DAST, IAST, SCA, DevSecOps, and Threat Modeling. Matt is an accomplished public speaker and has been quoted in 50+ AST industry media publications.

Related episodes

Bluesky
Email Us
ReversingGlass with Matt Rose

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top
ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabs
ReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
Typosquatting and software supply chain security

Typosquatting and software supply chain security

Learn More about Typosquatting and software supply chain security
Typosquatting and software supply chain security
title card

SCA Is Good. SSCS Is Better.

Learn More about SCA Is Good. SSCS Is Better.
SCA Is Good. SSCS Is Better.
ReversingGlass on Reproducible Builds: Graduate Your Application Security

Reproducible Builds: Graduate Your Application Security

Learn More about Reproducible Builds: Graduate Your Application Security
Reproducible Builds: Graduate Your Application Security

The 2025 Software Supply Chain Security Report

Learn More about The 2025 Software Supply Chain Security Report
The 2025 Software Supply Chain Security Report

Get Started: Request a Demo

Learn more about how ReversingLabs can help your company reduce attack surface risks with deep software and file threat analysis to speed release and response.

Request a Demo

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.