[{"data":1,"prerenderedAt":1047},["ShallowReactive",2],{"/es/the-source/security/why-legacy-code-is-a-security-risk-and-how-ai-can-help/":3,"footer-es":52,"the-source-banner-es":359,"the-source-navigation-es":371,"the-source-newsletter-es":398,"article-site-categories-es":409,"why-legacy-code-is-a-security-risk-and-how-ai-can-help-article-hero-category-es":411,"why-legacy-code-is-a-security-risk-and-how-ai-can-help-the-source-source-cta-es":435,"why-legacy-code-is-a-security-risk-and-how-ai-can-help-category-es":448,"why-legacy-code-is-a-security-risk-and-how-ai-can-help-the-source-resources-es":460,"why-legacy-code-is-a-security-risk-and-how-ai-can-help-article-hero-author-es":498},{"_path":4,"_dir":5,"_draft":6,"_partial":6,"_locale":7,"slug":8,"type":9,"category":5,"config":10,"seo":15,"content":20,"_id":45,"_type":46,"title":47,"_source":48,"_file":49,"_stem":50,"_extension":51},"/es/the-source/security/why-legacy-code-is-a-security-risk-and-how-ai-can-help","security",false,"","why-legacy-code-is-a-security-risk-and-how-ai-can-help","article",{"layout":11,"template":12,"featured":6,"author":13,"sourceCTA":14},"the-source","TheSourceArticle","joel-krooswyk","source-lp-how-a-devsecops-platform-drives-business-success-the-complete-guide",{"title":16,"ogTitle":16,"description":17,"ogDescription":17,"ogImage":18,"noIndex":19},"Por qué el código heredado es un riesgo y cómo ayuda la IA","Descubra cómo la refactorización del código con IA moderniza sistemas heredados, refuerza protocolos de seguridad y lleva la organización al futuro.","https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463670/cdynzww9p2annh3mmbhl.png",true,{"keyTakeaways":21,"description":25,"heroImage":18,"title":16,"date":26,"timeToRead":27,"articleBody":28,"faq":29},[22,23,24],"Mantener código heredado es costoso y demandante. Además, si no es compatible con las herramientas de seguridad más recientes, puede representar una responsabilidad significativa para las organizaciones de todos los sectores.","La refactorización del código es una estrategia que permite mejorar la legibilidad del código, lo que fortalece la estabilidad de código base y aumenta la productividad y eficiencia de los desarrolladores.","Combinada con herramientas de seguridad preventivas, la refactorización del código con tecnología de IA puede ayudar a los equipos a modernizar su código heredado y, al mismo tiempo, reducir el riesgo de vulnerabilidades de seguridad durante el proceso.","Descubra cómo la refactorización del código con tecnología de IA puede modernizar sistemas heredados, reforzar sus protocolos de seguridad e impulsar a su organización hacia el futuro.","2025-01-15T00:00:00.000Z","Lectura de 6 min","Today’s rapid acceleration of technology is exciting. It means new products and opportunities for growth and innovation are around every corner. And yet this speed of growth and change has its downsides, especially regarding security: just one bad actor can cause massive business disruption, reputation damage, and lost revenue.\n\nYou have likely heard industry leaders talk about their need for digital transformation and the worrisome dependency on outdated or “legacy” systems. While legacy code is not inherently problematic, it often isn’t compatible with modern security tools, leading to exploitable vulnerabilities. Coupled with open source code — which requires ongoing security vigilance — your code base may be putting your organization’s data, users, and reputation at risk. \n\nLegacy code is risky from a security and compliance perspective, and it’s also expensive and time-consuming for developers to maintain — if developers on your team even have the legacy knowledge to do the work. \n\nUltimately, this industry-wide reliance on legacy code is a concerning and costly practice. So, how do we work our way out of it?  \n\nBelow, I’ll explore legacy code and how organizations can increase the security of their code base with AI-powered code refactoring. Together with AI-driven testing and security capabilities, code refactoring will propel your codebase into the future while empowering your whole team to look ahead, not behind. \n\n## What is legacy code? \n\nBroadly, legacy code refers to an existing code base that a team inherits from previous team members and continues to use and maintain. The code might work just fine, but several different developers have likely modified it over the years. The current team might struggle to identify which modifications are valuable and which are not. Additionally, the code might be written using an outdated framework or in a programming language that no one on the team knows (whether it’s simply old or completely obsolete). \n\nIt might seem strange that companies still rely on legacy code. While the reasons can vary, think of it like this: You live in an old house. It's cozy and familiar, but the plumbing's unreliable, the wiring is outdated, and every time you fix one thing, something else breaks. Sure, you could remodel, but that means a huge upheaval – contractors, permits, living in chaos for months, and costs that can spiral out of control.\n\nSo, you keep patching things up, hoping for the best. It's not ideal, but it works — for now. That's kind of what it's like with legacy code. It's the familiar, “working” solution, even if it's creaky and inefficient. Rewriting it from scratch is a daunting prospect with its own risks and costs. Plus, who has time for a massive overhaul when there are new features to build and urgent bugs to fix?\n\nWhen it comes to updating code, many companies decide to keep their legacy code because maintaining it can be less disruptive in the short term. Updating code involves a lot of developing and testing code. It can also involve training a team to ensure they have the skills to work with the outdated code language or framework. If there isn’t any documentation, it can be even more challenging to navigate.   \n\n## What’s the problem with legacy code?\n\nIf your organization does decide to stick with your legacy code — and many do — you’re opening yourself up to a host of potential issues. Since this code wasn’t designed for newer tech, you might not be able to integrate it with the latest and greatest software (like AI tools, for example), which could also impact the performance and scalability of your products. This can hold you back and impact customer experience down the line. \n\nWhat’s most concerning about legacy code, whether it was written five years ago or 50, is that there may be no security scanners that work for this code. That means you can’t detect problems on your own while making updates. Moreover, developers making these updates may not understand the language or its structure well and might even accidentally create vulnerable code in the process. Finally, older applications are commonly written in C or C++, which are memory unsafe languages — proven to host [70% of identified vulnerabilities](https://www.cisa.gov/news-events/news/urgent-need-memory-safety-software-products).\n\nThese three issues — the fact that there may be no way to secure legacy code, there are fewer ways to safely update it, and that the end result is far more likely to be vulnerable — should be warning signs for organizations across industries. \n\nIn developing a catalog of bad practices that can put critical infrastructure at risk, the U.S. [Cybersecurity and Infrastructure Security Agency](https://www.cisa.gov/stopransomware/bad-practices) added the following:\n\n“Use of unsupported (or end-of-life) software in service of Critical Infrastructure and National Critical Functions is dangerous and significantly elevates risk to national security, national economic security, and national public health and safety. This dangerous practice is especially egregious in technologies accessible from the Internet.”\n\nEven if you aren’t working in national security or for national public health and safety, this warning is still applicable: Using old code is not a best practice. It’s a bad one. \n\n## The solution: Code refactoring\n\nAccording to software developer and author [Martin Fowler](https://www.martinfowler.com/), “Refactoring is a controlled technique for improving the design of an existing code base, a disciplined technique for restructuring an existing body of code, altering its internal structure without changing its external behavior.” \n\nIn other words, code refactoring allows you to secure and modernize your legacy code without obscuring its original functionality. \n\nThere are many refactoring techniques — from inline refactoring, which involves simplifying code by removing obsolete elements, to refactoring by abstraction, where duplicate code is deleted. What’s important to know is that code refactoring requires time and significant developer skills to do well. It also requires a lot of testing when developers are already busy working on other tasks. \n\nSo, while code refactoring is certainly the answer to bringing your legacy code into the future, making it readable, efficient, and secure, it is a project in and of itself, especially at scale. \n\n## How AI can help\n\nWe know that AI is already accelerating the software development lifecycle — and there’s a lot that [AI can do to help teams accelerate the refactoring process](https://about.gitlab.com/blog/2024/08/26/refactor-code-into-modern-languages-with-ai-powered-gitlab-duo/), too. For example, tools like [GitLab Duo](https://about.gitlab.com/blog/2024/04/18/gitlab-duo-chat-now-generally-available/) can help explain existing code and create new code, two of the biggest hurdles when modernizing legacy code. If a developer isn’t familiar with a language, AI can help fill in the blanks. Regarding testing and security, AI can also [analyze root causes, generate tests](https://about.gitlab.com/blog/2024/06/06/developing-gitlab-duo-blending-ai-and-root-cause-analysis-to-fix-ci-cd/), and [help developers remediate vulnerabilities](https://about.gitlab.com/the-source/ai/understand-and-resolve-vulnerabilities-with-ai-powered-gitlab-duo/). With AI in your toolkit, code refactoring can finally be more accessible and achievable for organizations, so they can move this project off their backlog for good. \n\nAccording to [our research](https://about.gitlab.com/developer-survey/2024/ai/), 34% of all respondents using AI across the software development lifecycle already use AI to modernize legacy code. This is even higher in the financial services industry (46%). \n\nOf course, there are a few things to keep in mind as you start to implement AI in any of your practices. \n\nAI isn’t perfect. It still requires testing, guardrails, and human oversight. So, while it absolutely can facilitate and accelerate some of these critical, time-consuming manual tasks, it can’t do this work alone. Especially regarding security, you should implement other tools to keep your code as secure as possible. We recommend creating a [dynamic software bill of materials](https://about.gitlab.com/blog/2022/10/25/the-ultimate-guide-to-sboms/) (also called an SBOM) to give you full visibility into the license and security risks associated with your software, including any legacy code you may have.\n\n## Bring your codebase into the future\n\nWhile the jump from legacy codebase maintenance to modernization might feel daunting, it is the best path forward if you want to keep your organization and user data secure. With the right tools and methods, it may be more efficient for your teams and cost-effective for your company. \n\nThe good news is that your teams don’t need to spend time and resources deciphering old languages and working with old frameworks — causing frustration, delays, and bottlenecks. By letting AI do the hard work of refactoring your code so that it’s safe, secure, and functioning as it should, developers can focus on what they do best: building new products and features and driving value for customers.",[30,33,36,39,42],{"header":31,"content":32},"¿Por qué el código heredado se considera un riesgo de seguridad?","El código heredado es arriesgado porque a menudo utiliza entornos de trabajo obsoletos o lenguajes de programación que carecen de medidas de seguridad modernas. Esto lo hace incompatible con las herramientas de seguridad más recientes, lo que incrementa el riesgo de vulnerabilidades. Además, los atacantes pueden explotar con facilidad el software sin soporte o al final de su vida útil, comprometiendo así la integridad y la seguridad de los datos.",{"header":34,"content":35},"¿Cómo puede la refactorización de código con tecnología de IA mejorar la seguridad del código heredado?","La refactorización del código con tecnología de IA moderniza los sistemas heredados mediante:\n- La identificación de patrones de codificación obsoletos o inseguros, y la sugerencia de alternativas más seguras.\n- La automatización de mejoras en el código sin modificar su comportamiento externo, lo que mejora la legibilidad y la capacidad de mantenimiento.\n- La generación de pruebas de seguridad y el análisis de causas raíz de vulnerabilidades, lo que permite una corrección más rápida,\nEste enfoque reduce el esfuerzo manual y acelera la transición a códigos base más seguros, eficientes y escalables.",{"header":37,"content":38},"¿Qué desafíos puede esperar al mantener el código heredado sin la ayuda de la IA?","Algunos de los principales desafíos incluyen:\n - __Falta de soporte para herramientas de seguridad modernas__: los escáneres de seguridad tradicionales pueden no ser compatibles con el código heredado.\n- __Entornos de trabajo complejos y obsoletos__: los desarrolladores pueden no tener la experiencia necesaria para mantener o actualizar el código antiguo.\n- __Altos costos de mantenimiento__: mantener sistemas heredados es costoso y demanda mucho tiempo, lo que desvía el foco de la innovación.\n- __Riesgos de seguridad__: el código obsoleto es más propenso a vulnerabilidades y ataques, lo que aumenta el riesgo de filtraciones de datos.",{"header":40,"content":41},"¿Cómo GitLab apoya la refactorización con tecnología de IA y la modernización del código heredado?","GitLab utiliza GitLab Duo para ayudar a los desarrolladores a comprender el código heredado, proporcionando explicaciones y generando código nuevo. También ofrece:\n - Análisis de seguridad con tecnología de IA para detectar vulnerabilidades en código heredado.\n- Pruebas y correcciones automatizadas para mejorar la seguridad del código.\n- Listas de materiales de software dinámicas (SBOM) para obtener visibilidad sobre las licencias y los riesgos de seguridad, incluidos los componentes heredados",{"header":43,"content":44},"¿Cuáles son los beneficios del uso de la IA para la refactorización de código heredado?","Estos son solo algunos de los beneficios:\n - __Mayor seguridad__: la IA identifica y mitiga vulnerabilidades, fortaleciendo la postura de seguridad.\n- __Mayor productividad__: la automatización de tareas repetitivas permite que los desarrolladores se centren en la innovación.\n- __Eficiencia de costos__: la modernización del código reduce los costos de mantenimiento al adaptarlo a entornos de trabajo y herramientas actuales.\n- __Modernización escalable__: la IA permite una refactorización escalable y consistente en códigos bases complejos, lo que prepara los activos de software de la organización para la perennidad.","content:es:the-source:security:why-legacy-code-is-a-security-risk-and-how-ai-can-help.yml","yaml","Why Legacy Code Is A Security Risk And How Ai Can Help","content","es/the-source/security/why-legacy-code-is-a-security-risk-and-how-ai-can-help.yml","es/the-source/security/why-legacy-code-is-a-security-risk-and-how-ai-can-help","yml",{"_path":53,"_dir":54,"_draft":6,"_partial":6,"_locale":7,"data":55,"_id":355,"_type":46,"title":356,"_source":48,"_file":357,"_stem":358,"_extension":51},"/shared/es/main-footer","es",{"text":56,"source":57,"edit":63,"contribute":68,"config":73,"items":78,"minimal":347},"Git es una marca registrada de Software Freedom Conservancy, y nuestro uso de «GitLab» está bajo licencia",{"text":58,"config":59},"Ver fuente de la página",{"href":60,"dataGaName":61,"dataGaLocation":62},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/","page source","footer",{"text":64,"config":65},"Editar esta página",{"href":66,"dataGaName":67,"dataGaLocation":62},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/content/","web ide",{"text":69,"config":70},"Contribuya",{"href":71,"dataGaName":72,"dataGaLocation":62},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/CONTRIBUTING.md/","please contribute",{"twitter":74,"facebook":75,"youtube":76,"linkedin":77},"https://twitter.com/gitlab","https://www.facebook.com/gitlab","https://www.youtube.com/channel/UCnMGQ8QHMAnVIsI3xJrihhg","https://www.linkedin.com/company/gitlab-com",[79,106,179,247,309],{"title":80,"links":81,"subMenu":87},"Plataforma",[82],{"text":83,"config":84},"Plataforma de DevSecOps",{"href":85,"dataGaName":86,"dataGaLocation":62},"/es/platform/","devsecops platform",[88],{"title":89,"links":90},"Precios",[91,96,101],{"text":92,"config":93},"Ver planes",{"href":94,"dataGaName":95,"dataGaLocation":62},"/es/pricing/","view plans",{"text":97,"config":98},"¿Por qué elegir GitLab Premium?",{"href":99,"dataGaName":100,"dataGaLocation":62},"/es/pricing/premium/","why premium",{"text":102,"config":103},"¿Por qué elegir GitLab Ultimate?",{"href":104,"dataGaName":105,"dataGaLocation":62},"/es/pricing/ultimate/","why ultimate",{"title":107,"links":108},"Soluciones",[109,114,119,124,129,134,139,144,149,154,159,164,169,174],{"text":110,"config":111},"Transformación digital",{"href":112,"dataGaName":113,"dataGaLocation":62},"/es/topics/digital-transformation/","digital transformation",{"text":115,"config":116},"Seguridad y cumplimiento",{"href":117,"dataGaName":118,"dataGaLocation":62},"/solutions/application-security-testing/","Application security testing",{"text":120,"config":121},"Entrega de software automatizada",{"href":122,"dataGaName":123,"dataGaLocation":62},"/solutions/delivery-automation/","automated software delivery",{"text":125,"config":126},"Desarrollo ágil",{"href":127,"dataGaName":128,"dataGaLocation":62},"/es/solutions/agile-delivery/","agile delivery",{"text":130,"config":131},"Transformación en la nube",{"href":132,"dataGaName":133,"dataGaLocation":62},"/es/topics/cloud-native/","cloud transformation",{"text":135,"config":136},"Gestión del código fuente",{"href":137,"dataGaName":138,"dataGaLocation":62},"/es/solutions/source-code-management/","source code management",{"text":140,"config":141},"CI/CD",{"href":142,"dataGaName":143,"dataGaLocation":62},"/es/solutions/continuous-integration/","continuous integration & delivery",{"text":145,"config":146},"Gestión del flujo de valor",{"href":147,"dataGaName":148,"dataGaLocation":62},"/es/solutions/value-stream-management/","value stream management",{"text":150,"config":151},"GitOps",{"href":152,"dataGaName":153,"dataGaLocation":62},"/es/solutions/gitops/","gitops",{"text":155,"config":156},"Empresas",{"href":157,"dataGaName":158,"dataGaLocation":62},"/es/enterprise/","enterprise",{"text":160,"config":161},"Pequeñas empresas",{"href":162,"dataGaName":163,"dataGaLocation":62},"/es/small-business/","small business",{"text":165,"config":166},"Sector público",{"href":167,"dataGaName":168,"dataGaLocation":62},"/es/solutions/public-sector/","public sector",{"text":170,"config":171},"Educación",{"href":172,"dataGaName":173,"dataGaLocation":62},"/es/solutions/education/","education",{"text":175,"config":176},"Servicios financieros",{"href":177,"dataGaName":178,"dataGaLocation":62},"/es/solutions/finance/","financial services",{"title":180,"links":181},"Recursos",[182,187,192,197,202,207,212,217,222,227,232,237,242],{"text":183,"config":184},"Instalar",{"href":185,"dataGaName":186,"dataGaLocation":62},"/es/install/","install",{"text":188,"config":189},"Guías de inicio rápido",{"href":190,"dataGaName":191,"dataGaLocation":62},"/es/get-started/","quick setup checklists",{"text":193,"config":194},"Aprender",{"href":195,"dataGaName":196,"dataGaLocation":62},"https://university.gitlab.com/","learn",{"text":198,"config":199},"Documentación del producto",{"href":200,"dataGaName":201,"dataGaLocation":62},"https://docs.gitlab.com/","docs",{"text":203,"config":204},"Blog",{"href":205,"dataGaName":206,"dataGaLocation":62},"/blog/","blog",{"text":208,"config":209},"Historias de éxito del cliente",{"href":210,"dataGaName":211,"dataGaLocation":62},"/es/customers/","customer success stories",{"text":213,"config":214},"Remoto",{"href":215,"dataGaName":216,"dataGaLocation":62},"https://handbook.gitlab.com/handbook/company/culture/all-remote/","remote",{"text":218,"config":219},"Servicios de GitLab",{"href":220,"dataGaName":221,"dataGaLocation":62},"/es/services/","services",{"text":223,"config":224},"TeamOps",{"href":225,"dataGaName":226,"dataGaLocation":62},"/es/teamops/","teamops",{"text":228,"config":229},"Comunidad",{"href":230,"dataGaName":231,"dataGaLocation":62},"/community/","community",{"text":233,"config":234},"Foro",{"href":235,"dataGaName":236,"dataGaLocation":62},"https://forum.gitlab.com/","forum",{"text":238,"config":239},"Eventos",{"href":240,"dataGaName":241,"dataGaLocation":62},"/events/","events",{"text":243,"config":244},"Socios",{"href":245,"dataGaName":246,"dataGaLocation":62},"/partners/","partners",{"title":248,"links":249},"Empresa",[250,255,260,265,270,275,280,284,289,294,299,304],{"text":251,"config":252},"Acerca de nosotros",{"href":253,"dataGaName":254,"dataGaLocation":62},"/es/company/","company",{"text":256,"config":257},"Jobs",{"href":258,"dataGaName":259,"dataGaLocation":62},"/jobs/","jobs",{"text":261,"config":262},"Liderazgo",{"href":263,"dataGaName":264,"dataGaLocation":62},"/company/team/e-group/","leadership",{"text":266,"config":267},"Equipo",{"href":268,"dataGaName":269,"dataGaLocation":62},"/company/team/","team",{"text":271,"config":272},"Manual",{"href":273,"dataGaName":274,"dataGaLocation":62},"https://handbook.gitlab.com/","handbook",{"text":276,"config":277},"Relaciones con los inversores",{"href":278,"dataGaName":279,"dataGaLocation":62},"https://ir.gitlab.com/","investor relations",{"text":281,"config":282},"Sustainability",{"href":283,"dataGaName":281,"dataGaLocation":62},"/sustainability/",{"text":285,"config":286},"Diversidad, inclusión y pertenencia (DIB)",{"href":287,"dataGaName":288,"dataGaLocation":62},"/es/diversity-inclusion-belonging/","Diversity, inclusion and belonging",{"text":290,"config":291},"Centro de confianza",{"href":292,"dataGaName":293,"dataGaLocation":62},"/es/security/","trust center",{"text":295,"config":296},"Boletín",{"href":297,"dataGaName":298,"dataGaLocation":62},"/company/contact/","newsletter",{"text":300,"config":301},"Prensa",{"href":302,"dataGaName":303,"dataGaLocation":62},"/press/","press",{"text":305,"config":306},"Declaración de transparencia sobre la Ley de Esclavitud Moderna",{"href":307,"dataGaName":308,"dataGaLocation":62},"https://handbook.gitlab.com/handbook/legal/modern-slavery-act-transparency-statement/","modern slavery transparency statement",{"title":310,"links":311},"Comuníquese con nosotros",[312,317,322,327,332,337,342],{"text":313,"config":314},"Contactar con un experto",{"href":315,"dataGaName":316,"dataGaLocation":62},"/es/sales/","sales",{"text":318,"config":319},"Obtener ayuda",{"href":320,"dataGaName":321,"dataGaLocation":62},"/support/","get help",{"text":323,"config":324},"Portal de clientes",{"href":325,"dataGaName":326,"dataGaLocation":62},"https://customers.gitlab.com/customers/sign_in/","customer portal",{"text":328,"config":329},"Estado",{"href":330,"dataGaName":331,"dataGaLocation":62},"https://status.gitlab.com/","status",{"text":333,"config":334},"Términos de uso",{"href":335,"dataGaName":336,"dataGaLocation":62},"/terms/","terms of use",{"text":338,"config":339},"Declaración de privacidad",{"href":340,"dataGaName":341,"dataGaLocation":62},"/es/privacy/","privacy statement",{"text":343,"config":344},"Preferencias de cookies",{"dataGaName":345,"dataGaLocation":62,"id":346,"isOneTrustButton":19},"cookie preferences","ot-sdk-btn",{"items":348},[349,351,353],{"text":333,"config":350},{"href":335,"dataGaName":336,"dataGaLocation":62},{"text":338,"config":352},{"href":340,"dataGaName":341,"dataGaLocation":62},{"text":343,"config":354},{"dataGaName":345,"dataGaLocation":62,"id":346,"isOneTrustButton":19},"content:shared:es:main-footer.yml","Main Footer","shared/es/main-footer.yml","shared/es/main-footer",{"_path":360,"_dir":361,"_draft":6,"_partial":6,"_locale":7,"id":362,"visibility":19,"title":363,"button":364,"_id":368,"_type":46,"_source":48,"_file":369,"_stem":370,"_extension":51},"/shared/es/the-source/banner/the-economics-of-software-innovation-2025-08-18","banner","The Economics of Software Innovation","The Economics of Software Innovation—AI’s $750 Billion Opportunity",{"config":365,"text":367},{"href":366},"/software-innovation-report/","Get the research report","content:shared:es:the-source:banner:the-economics-of-software-innovation-2025-08-18.yml","shared/es/the-source/banner/the-economics-of-software-innovation-2025-08-18.yml","shared/es/the-source/banner/the-economics-of-software-innovation-2025-08-18",{"_path":372,"_dir":11,"_draft":6,"_partial":6,"_locale":7,"logo":373,"subscribeLink":378,"navItems":382,"_id":394,"_type":46,"title":395,"_source":48,"_file":396,"_stem":397,"_extension":51},"/shared/es/the-source/navigation",{"altText":374,"config":375},"the source logo",{"src":376,"href":377},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1750191004/t7wz1klfb2kxkezksv9t.svg","/es/the-source/",{"text":379,"config":380},"Suscribirse",{"href":381},"#subscribe",[383,387,390],{"text":384,"config":385},"Inteligencia artificial",{"href":386},"/es/the-source/ai/",{"text":115,"config":388},{"href":389},"/es/the-source/security/",{"text":391,"config":392},"Plataforma e infraestructura",{"href":393},"/es/the-source/platform/","content:shared:es:the-source:navigation.yml","Navigation","shared/es/the-source/navigation.yml","shared/es/the-source/navigation",{"_path":399,"_dir":11,"_draft":6,"_partial":6,"_locale":7,"title":400,"description":401,"submitMessage":402,"formData":403,"_id":406,"_type":46,"_source":48,"_file":407,"_stem":408,"_extension":51},"/shared/es/the-source/newsletter","Boletín The Source","Manténgase al día con información sobre el futuro del desarrollo de software.","Se ha suscrito correctamente al boletín The Source.",{"config":404},{"formId":405,"formName":298,"hideRequiredLabel":19},28470,"content:shared:es:the-source:newsletter.yml","shared/es/the-source/newsletter.yml","shared/es/the-source/newsletter",{"categoryNames":410},{"ai":384,"platform":391,"security":115},{"_path":412,"_dir":11,"_draft":6,"_partial":6,"_locale":7,"config":413,"seo":414,"content":416,"type":431,"slug":5,"_id":432,"_type":46,"title":7,"_source":48,"_file":433,"_stem":434,"_extension":51},"/es/the-source/security",{"layout":11},{"title":115,"description":415,"ogImage":7},"Infórmese sobre cómo las organizaciones pueden mantenerse actualizadas respecto a la evolución de las amenazas de seguridad y los requisitos de cumplimiento.",[417,423],{"componentName":418,"componentContent":419},"TheSourceCategoryHero",{"title":115,"description":415,"image":420},{"config":421},{"src":422},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463273/aplkxrvwpii26xao5yhi.png",{"componentName":424,"componentContent":425},"TheSourceCategoryMainSection",{"config":426},{"sourceCTAs":427},[428,429,430],"source-lp-guide-to-dynamic-sboms","source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain","application-security-in-the-digital-age","category","content:es:the-source:security:index.yml","es/the-source/security/index.yml","es/the-source/security/index",{"_path":436,"_dir":437,"_draft":6,"_partial":6,"_locale":7,"config":438,"link":439,"_id":444,"_type":46,"title":445,"_source":48,"_file":446,"_stem":447,"_extension":51},"/shared/es/the-source/source-lp-ctas/source-lp-how-a-devsecops-platform-drives-business-success-the-complete-guide","source-lp-ctas",{"slug":14},{"config":440},{"href":441,"dataGaName":442,"dataGaLocation":443},"/the-source/platform/how-a-devsecops-platform-drives-business-success/","Driving Business Success with DevSecOps","thesource","content:shared:es:the-source:source-lp-ctas:source-lp-how-a-devsecops-platform-drives-business-success-the-complete-guide.yml","Source Lp How A Devsecops Platform Drives Business Success The Complete Guide","shared/es/the-source/source-lp-ctas/source-lp-how-a-devsecops-platform-drives-business-success-the-complete-guide.yml","shared/es/the-source/source-lp-ctas/source-lp-how-a-devsecops-platform-drives-business-success-the-complete-guide",{"_path":412,"_dir":11,"_draft":6,"_partial":6,"_locale":7,"config":449,"seo":450,"content":451,"type":431,"slug":5,"_id":432,"_type":46,"title":7,"_source":48,"_file":433,"_stem":434,"_extension":51},{"layout":11},{"title":115,"description":415,"ogImage":7},[452,456],{"componentName":418,"componentContent":453},{"title":115,"description":415,"image":454},{"config":455},{"src":422},{"componentName":424,"componentContent":457},{"config":458},{"sourceCTAs":459},[428,429,430],[461,474,485],{"_path":462,"_dir":437,"_draft":6,"_partial":6,"_locale":7,"config":463,"title":464,"description":465,"link":466,"_id":471,"_type":46,"_source":48,"_file":472,"_stem":473,"_extension":51},"/shared/es/the-source/source-lp-ctas/application-security-in-the-digital-age",{"slug":430},"Seguridad de las aplicaciones en la era digital","Lea los [resultados de la encuesta de más de 5000 profesionales de DevSecOps en todo el mundo](https://about.gitlab.com/developer-survey/2024/security-compliance/) para obtener información sobre cómo las organizaciones están lidiando con el aumento de las superficies de ataque y cambiando el comportamiento hacia la seguridad y la IA.",{"text":467,"config":468},"Leer el informe",{"href":469,"dataGaName":470,"dataGaLocation":443},"/developer-survey/2024/security-compliance","Application Security in the Digital Age","content:shared:es:the-source:source-lp-ctas:application-security-in-the-digital-age.yml","shared/es/the-source/source-lp-ctas/application-security-in-the-digital-age.yml","shared/es/the-source/source-lp-ctas/application-security-in-the-digital-age",{"_path":475,"_dir":437,"_draft":6,"_partial":6,"_locale":7,"config":476,"title":477,"link":478,"_id":482,"_type":46,"_source":48,"_file":483,"_stem":484,"_extension":51},"/shared/es/the-source/source-lp-ctas/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain",{"slug":429},"Una guía de campo para los vectores de amenazas en la cadena de suministro de software",{"config":479},{"href":480,"dataGaName":481,"dataGaLocation":443},"/the-source/security/field-guide-to-threat-vectors-in-the-software-supply-chain/","A field guide to threat vectors in the software supply chain","content:shared:es:the-source:source-lp-ctas:source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain.yml","shared/es/the-source/source-lp-ctas/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain.yml","shared/es/the-source/source-lp-ctas/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain",{"_path":486,"_dir":437,"_draft":6,"_partial":6,"_locale":7,"config":487,"title":488,"description":489,"link":490,"_id":495,"_type":46,"_source":48,"_file":496,"_stem":497,"_extension":51},"/shared/es/the-source/source-lp-ctas/source-lp-guide-to-dynamic-sboms",{"slug":428},"Guía de GitLab para SBOM dinámicos: un elemento integral del desarrollo de software moderno","Descubre cómo obtener visibilidad sobre riesgos organizacionales previamente no identificados mediante una lista de materiales de software (SBOM).",{"text":491,"config":492},"Leer la guía",{"href":493,"dataGaName":494,"dataGaLocation":443},"/the-source/security/guide-to-dynamic-sboms/","Guide to Dynamic SBOMs","content:shared:es:the-source:source-lp-ctas:source-lp-guide-to-dynamic-sboms.yml","shared/es/the-source/source-lp-ctas/source-lp-guide-to-dynamic-sboms.yml","shared/es/the-source/source-lp-ctas/source-lp-guide-to-dynamic-sboms",[499,522,538,554,570,591,611,627,645,665,682,703,719,737,754,772,791,809,828,848,869,885,901,919,937,956,972,990,1006,1025],{"_path":500,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":502,"seo":503,"content":505,"type":517,"slug":518,"_id":519,"_type":46,"title":504,"_source":48,"_file":520,"_stem":521,"_extension":51},"/es/the-source/authors/amanda-rueda","authors",{"layout":11},{"title":504},"Amanda Rueda",[506,515],{"componentName":507,"componentContent":508},"TheSourceAuthorHero",{"config":509,"name":504,"headshot":512},{"gitlabHandle":510,"linkedInProfileUrl":511},"amandarueda","https://www.linkedin.com/in/amandamrueda/",{"altText":504,"config":513},{"src":514},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463383/osecw1pzbxvb7fhqhiky.png",{"componentName":516},"TheSourceArticlesList","author","amanda-rueda","content:es:the-source:authors:amanda-rueda.yml","es/the-source/authors/amanda-rueda.yml","es/the-source/authors/amanda-rueda",{"_path":523,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":524,"seo":525,"content":527,"type":517,"slug":534,"_id":535,"_type":46,"title":526,"_source":48,"_file":536,"_stem":537,"_extension":51},"/es/the-source/authors/andre-michael-braun",{"layout":11},{"title":526},"Andre Michael Braun",[528,533],{"componentName":507,"componentContent":529},{"name":526,"headshot":530},{"altText":526,"config":531},{"src":532},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463336/yl27k7wdlnkzsizwknn1.jpg",{"componentName":516},"andre-michael-braun","content:es:the-source:authors:andre-michael-braun.yml","es/the-source/authors/andre-michael-braun.yml","es/the-source/authors/andre-michael-braun",{"_path":539,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":540,"seo":541,"content":543,"type":517,"slug":550,"_id":551,"_type":46,"title":542,"_source":48,"_file":552,"_stem":553,"_extension":51},"/es/the-source/authors/andrew-haschka",{"layout":11},{"title":542},"Andrew Haschka",[544,549],{"componentName":507,"componentContent":545},{"name":542,"headshot":546},{"altText":542,"config":547},{"src":548},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463349/z1qnc4uxmqgg3hnm3da4.png",{"componentName":516},"andrew-haschka","content:es:the-source:authors:andrew-haschka.yml","es/the-source/authors/andrew-haschka.yml","es/the-source/authors/andrew-haschka",{"_path":555,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":556,"seo":557,"content":559,"type":517,"slug":566,"_id":567,"_type":46,"title":558,"_source":48,"_file":568,"_stem":569,"_extension":51},"/es/the-source/authors/ayoub-fandi",{"layout":11},{"title":558},"Ayoub Fandi",[560,565],{"componentName":507,"componentContent":561},{"name":558,"headshot":562},{"altText":558,"config":563},{"src":564},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463329/wyp554loeyoibx3ozren.jpg",{"componentName":516},"ayoub-fandi","content:es:the-source:authors:ayoub-fandi.yml","es/the-source/authors/ayoub-fandi.yml","es/the-source/authors/ayoub-fandi",{"_path":571,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":572,"seo":573,"content":575,"type":517,"slug":587,"_id":588,"_type":46,"title":574,"_source":48,"_file":589,"_stem":590,"_extension":51},"/es/the-source/authors/brian-wald",{"layout":11},{"title":574},"Brian Wald",[576,586],{"componentName":507,"componentContent":577},{"config":578,"name":574,"role":581,"bio":582,"headshot":583},{"gitlabHandle":579,"linkedInProfileUrl":580},"brianwald","https://www.linkedin.com/in/brianwald/","Jefe de la Organización Global de CTO de Campo","Brian Wald es el jefe de la organización global de CTO de campo en GitLab. Lidera un equipo dinámico de CTO de campo dedicado a transformar las prácticas de desarrollo de software empresarial.",{"altText":574,"config":584},{"src":585},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463417/fugpbux9miqbdx3wewtu.jpg",{"componentName":516},"brian-wald","content:es:the-source:authors:brian-wald.yml","es/the-source/authors/brian-wald.yml","es/the-source/authors/brian-wald",{"_path":592,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":593,"seo":594,"content":596,"type":517,"slug":607,"_id":608,"_type":46,"title":595,"_source":48,"_file":609,"_stem":610,"_extension":51},"/es/the-source/authors/bryan-ross",{"layout":11},{"title":595},"Bryan Ross",[597,606],{"componentName":507,"componentContent":598},{"config":599,"name":595,"headshot":603},{"gitlabHandle":600,"twitterXProfileUrl":601,"linkedInProfileUrl":602},"bryanrossuk","https://twitter.com/bryanrossuk","https://www.linkedin.com/in/bryanross",{"altText":595,"config":604},{"src":605},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463324/mvdyvskii4hltdrgqxom.jpg",{"componentName":516},"bryan-ross","content:es:the-source:authors:bryan-ross.yml","es/the-source/authors/bryan-ross.yml","es/the-source/authors/bryan-ross",{"_path":612,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":613,"seo":614,"content":616,"type":517,"slug":623,"_id":624,"_type":46,"title":615,"_source":48,"_file":625,"_stem":626,"_extension":51},"/es/the-source/authors/chandler-gibbons",{"layout":11},{"title":615},"Chandler Gibbons",[617,622],{"componentName":507,"componentContent":618},{"name":615,"headshot":619},{"altText":615,"config":620},{"src":621},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463362/o7g9fqtqtjvegfwniuxh.jpg",{"componentName":516},"chandler-gibbons","content:es:the-source:authors:chandler-gibbons.yml","es/the-source/authors/chandler-gibbons.yml","es/the-source/authors/chandler-gibbons",{"_path":628,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":629,"seo":630,"content":632,"type":517,"slug":641,"_id":642,"_type":46,"title":631,"_source":48,"_file":643,"_stem":644,"_extension":51},"/es/the-source/authors/dave-steer",{"layout":11},{"title":631},"Dave Steer",[633,640],{"componentName":507,"componentContent":634},{"config":635,"name":631,"headshot":637},{"gitlabHandle":636},"dsteer",{"altText":631,"config":638},{"src":639},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463457/zbtapdkglu3yb9suaq7w.png",{"componentName":516},"dave-steer","content:es:the-source:authors:dave-steer.yml","es/the-source/authors/dave-steer.yml","es/the-source/authors/dave-steer",{"_path":646,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":647,"seo":648,"content":650,"type":517,"slug":660,"_id":661,"_type":46,"title":662,"_source":48,"_file":663,"_stem":664,"_extension":51},"/es/the-source/authors/ddesanto",{"layout":11},{"title":649},"David DeSanto",[651,659],{"componentName":507,"componentContent":652},{"config":653,"name":649,"headshot":656},{"gitlabHandle":654,"linkedInProfileUrl":655},"david","https://www.linkedin.com/in/ddesanto/",{"altText":649,"config":657},{"src":658},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463446/bgnljs84zcsxj0t6nvix.png",{"componentName":516},"ddesanto","content:es:the-source:authors:ddesanto.yml","Ddesanto","es/the-source/authors/ddesanto.yml","es/the-source/authors/ddesanto",{"_path":666,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":667,"seo":668,"content":670,"type":517,"slug":677,"_id":678,"_type":46,"title":679,"_source":48,"_file":680,"_stem":681,"_extension":51},"/es/the-source/authors/derek-debellis",{"layout":11},{"title":669},"Derek DeBellis",[671,676],{"componentName":507,"componentContent":672},{"name":669,"headshot":673},{"altText":669,"config":674},{"src":675},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463385/sbnjwfaguszi5g2smzr7.png",{"componentName":516},"derek-debellis","content:es:the-source:authors:derek-debellis.yml","Derek Debellis","es/the-source/authors/derek-debellis.yml","es/the-source/authors/derek-debellis",{"_path":683,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":684,"seo":685,"content":687,"type":517,"slug":699,"_id":700,"_type":46,"title":686,"_source":48,"_file":701,"_stem":702,"_extension":51},"/es/the-source/authors/emilio-salvador",{"layout":11},{"title":686},"Emilio Salvador",[688,698],{"componentName":507,"componentContent":689},{"config":690,"name":686,"role":693,"bio":694,"headshot":695},{"gitlabHandle":691,"linkedInProfileUrl":692},"esalvadorp","https://www.linkedin.com/in/emiliosp/","Vicepresidente de Estrategia y Relaciones con Desarrolladores","Emilio Salvador es vicepresidente de estrategia y relaciones con desarrolladores en GitLab. Ejecutivo en tecnología con más de 20 años de experiencia, Emilio ha desempeñado cargos en Amazon y Microsoft, y recientemente dirigió la estrategia y las operaciones del equipo de promoción y experiencia de desarrolladores de Google. Tiene una maestría (MBA) de la MIT Sloan School of Management.",{"altText":686,"config":696},{"src":697},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463402/g0snp3uisjm4tj3pkqcw.jpg",{"componentName":516},"emilio-salvador","content:es:the-source:authors:emilio-salvador.yml","es/the-source/authors/emilio-salvador.yml","es/the-source/authors/emilio-salvador",{"_path":704,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":705,"seo":706,"content":708,"type":517,"slug":715,"_id":716,"_type":46,"title":707,"_source":48,"_file":717,"_stem":718,"_extension":51},"/es/the-source/authors/erika-feldman",{"layout":11},{"title":707},"Erika Feldman",[709,714],{"componentName":507,"componentContent":710},{"name":707,"headshot":711},{"altText":707,"config":712},{"src":713},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463354/d9quqvz7d2ayjwif7vdn.png",{"componentName":516},"erika-feldman","content:es:the-source:authors:erika-feldman.yml","es/the-source/authors/erika-feldman.yml","es/the-source/authors/erika-feldman",{"_path":720,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":721,"seo":722,"content":724,"type":517,"slug":733,"_id":734,"_type":46,"title":723,"_source":48,"_file":735,"_stem":736,"_extension":51},"/es/the-source/authors/george-kichukov",{"layout":11},{"title":723},"George Kichukov",[725,732],{"componentName":507,"componentContent":726},{"config":727,"name":723,"headshot":729},{"gitlabHandle":728},"gkichukov",{"altText":723,"config":730},{"src":731},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463366/dk2knfancgsxocjkmyoa.jpg",{"componentName":516},"george-kichukov","content:es:the-source:authors:george-kichukov.yml","es/the-source/authors/george-kichukov.yml","es/the-source/authors/george-kichukov",{"_path":738,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":739,"seo":740,"content":742,"type":517,"slug":749,"_id":750,"_type":46,"title":751,"_source":48,"_file":752,"_stem":753,"_extension":51},"/es/the-source/authors/gitlab",{"layout":11},{"title":741},"GitLab",[743,748],{"componentName":507,"componentContent":744},{"name":741,"headshot":745},{"altText":741,"config":746},{"src":747},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463461/ts7io0hgpdyqylbzfire.png",{"componentName":516},"gitlab","content:es:the-source:authors:gitlab.yml","Gitlab","es/the-source/authors/gitlab.yml","es/the-source/authors/gitlab",{"_path":755,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":756,"seo":757,"content":759,"type":517,"slug":768,"_id":769,"_type":46,"title":758,"_source":48,"_file":770,"_stem":771,"_extension":51},"/es/the-source/authors/grant-hickman",{"layout":11},{"title":758},"Grant Hickman",[760,767],{"componentName":507,"componentContent":761},{"config":762,"name":758,"headshot":764},{"gitlabHandle":763},"g.hickman",{"altText":758,"config":765},{"src":766},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463463/f3uqwtugqotyhwutz5gu.png",{"componentName":516},"grant-hickman","content:es:the-source:authors:grant-hickman.yml","es/the-source/authors/grant-hickman.yml","es/the-source/authors/grant-hickman",{"_path":773,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":774,"seo":775,"content":777,"type":517,"slug":787,"_id":788,"_type":46,"title":776,"_source":48,"_file":789,"_stem":790,"_extension":51},"/es/the-source/authors/haim-snir",{"layout":11},{"title":776},"Haim Snir",[778,786],{"componentName":507,"componentContent":779},{"config":780,"name":776,"headshot":783},{"gitlabHandle":781,"linkedInProfileUrl":782},"hsnir1","https://www.linkedin.com/in/haimsnir/",{"altText":776,"config":784},{"src":785},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463395/nubmshvaq8wpomopllni.png",{"componentName":516},"haim-snir","content:es:the-source:authors:haim-snir.yml","es/the-source/authors/haim-snir.yml","es/the-source/authors/haim-snir",{"_path":792,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":793,"seo":794,"content":796,"type":517,"slug":800,"_id":805,"_type":46,"title":806,"_source":48,"_file":807,"_stem":808,"_extension":51},"/es/the-source/authors/iganbaruch",{"layout":11},{"title":795},"Itzik Gan Baruch",[797,804],{"componentName":507,"componentContent":798},{"config":799,"name":795,"headshot":801},{"gitlabHandle":800},"iganbaruch",{"altText":795,"config":802},{"src":803},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463443/vibb2fkc0ojni2d1eqde.png",{"componentName":516},"content:es:the-source:authors:iganbaruch.yml","Iganbaruch","es/the-source/authors/iganbaruch.yml","es/the-source/authors/iganbaruch",{"_path":810,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":811,"seo":812,"content":814,"type":517,"slug":823,"_id":824,"_type":46,"title":825,"_source":48,"_file":826,"_stem":827,"_extension":51},"/es/the-source/authors/jlongo",{"layout":11},{"title":813},"Joseph Longo",[815,822],{"componentName":507,"componentContent":816},{"config":817,"name":813,"headshot":819},{"gitlabHandle":818},"jlongo_gitlab",{"altText":813,"config":820},{"src":821},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463434/uoxaknpmoposbbgzqji8.png",{"componentName":516},"jlongo","content:es:the-source:authors:jlongo.yml","Jlongo","es/the-source/authors/jlongo.yml","es/the-source/authors/jlongo",{"_path":829,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":830,"seo":831,"content":833,"type":517,"slug":13,"_id":845,"_type":46,"title":832,"_source":48,"_file":846,"_stem":847,"_extension":51},"/es/the-source/authors/joel-krooswyk",{"layout":11},{"title":832},"Joel Krooswyk",[834,844],{"componentName":507,"componentContent":835},{"config":836,"name":832,"role":839,"bio":840,"headshot":841},{"gitlabHandle":837,"linkedInProfileUrl":838},"jkrooswyk","https://www.linkedin.com/in/joelrkrooswyk/","Director de tecnología federal","Joel Krooswyk es el director de Tecnología federal en GitLab. Ha participado activamente en el crecimiento de GitLab desde 2017. Sus 25 años de experiencia en liderazgo abarcan no solo el sector público de Estados Unidos, sino también pequeñas, medianas y grandes empresas a nivel mundial. Joel combina una profunda experiencia en políticas gubernamentales con un amplio conocimiento en tecnología, desarrollo de software, inteligencia artificial y ciberseguridad. La industria y las agencias a menudo le piden sus comentarios y respuestas sobre políticas.",{"altText":832,"config":842},{"src":843},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463423/mkmdhuxsjggfvokdmdv7.jpg",{"componentName":516},"content:es:the-source:authors:joel-krooswyk.yml","es/the-source/authors/joel-krooswyk.yml","es/the-source/authors/joel-krooswyk",{"_path":849,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":850,"seo":851,"content":853,"type":517,"slug":865,"_id":866,"_type":46,"title":852,"_source":48,"_file":867,"_stem":868,"_extension":51},"/es/the-source/authors/josh-lemos",{"layout":11},{"title":852},"Josh Lemos",[854,864],{"componentName":507,"componentContent":855},{"config":856,"name":852,"role":859,"bio":860,"headshot":861},{"gitlabHandle":857,"linkedInProfileUrl":858},"joshlemos","https://www.linkedin.com/in/joshlemos/","Director de Seguridad de la Información","Josh Lemos es director de Seguridad de la Información en GitLab Inc. Sus 20 años de experiencia dirigiendo equipos de seguridad de la información lo convierten una parte fundamental del equipo. Su responsabilidad incluye definir y mantener la visión, la estrategia y el programa de la empresa para garantizar la protección de los activos y las tecnologías de la información, fortalecer la plataforma de DevSecOps de GitLab y garantizar el máximo nivel de seguridad para los clientes.",{"altText":852,"config":862},{"src":863},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463405/f4rqtiecakrekvxfhqar.jpg",{"componentName":516},"josh-lemos","content:es:the-source:authors:josh-lemos.yml","es/the-source/authors/josh-lemos.yml","es/the-source/authors/josh-lemos",{"_path":870,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":871,"seo":872,"content":874,"type":517,"slug":881,"_id":882,"_type":46,"title":873,"_source":48,"_file":883,"_stem":884,"_extension":51},"/es/the-source/authors/julie-griffin",{"layout":11},{"title":873},"Julie Griffin",[875,880],{"componentName":507,"componentContent":876},{"name":873,"headshot":877},{"altText":873,"config":878},{"src":879},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463371/hqkbr3uk8hw2de7tltn4.webp",{"componentName":516},"julie-griffin","content:es:the-source:authors:julie-griffin.yml","es/the-source/authors/julie-griffin.yml","es/the-source/authors/julie-griffin",{"_path":886,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":887,"seo":888,"content":890,"type":517,"slug":897,"_id":898,"_type":46,"title":889,"_source":48,"_file":899,"_stem":900,"_extension":51},"/es/the-source/authors/kristina-weis",{"layout":11},{"title":889},"Kristina Weis",[891,896],{"componentName":507,"componentContent":892},{"name":889,"headshot":893},{"altText":889,"config":894},{"src":895},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463469/eoolq6n6bs0zb8gmf0js.webp",{"componentName":516},"kristina-weis","content:es:the-source:authors:kristina-weis.yml","es/the-source/authors/kristina-weis.yml","es/the-source/authors/kristina-weis",{"_path":902,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":903,"seo":904,"content":906,"type":517,"slug":915,"_id":916,"_type":46,"title":905,"_source":48,"_file":917,"_stem":918,"_extension":51},"/es/the-source/authors/lee-faus",{"layout":11},{"title":905},"Lee Faus",[907,914],{"componentName":507,"componentContent":908},{"config":909,"name":905,"headshot":911},{"gitlabHandle":910},"lfaus",{"altText":905,"config":912},{"src":913},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463398/vivhlomglvnstamj54bo.jpg",{"componentName":516},"lee-faus","content:es:the-source:authors:lee-faus.yml","es/the-source/authors/lee-faus.yml","es/the-source/authors/lee-faus",{"_path":920,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":921,"seo":922,"content":924,"type":517,"slug":928,"_id":933,"_type":46,"title":934,"_source":48,"_file":935,"_stem":936,"_extension":51},"/es/the-source/authors/ncregan",{"layout":11},{"title":923},"Niall Cregan",[925,932],{"componentName":507,"componentContent":926},{"config":927,"name":923,"headshot":929},{"gitlabHandle":928},"ncregan",{"altText":923,"config":930},{"src":931},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463431/yrtwodocb4cu3j7lkhyo.png",{"componentName":516},"content:es:the-source:authors:ncregan.yml","Ncregan","es/the-source/authors/ncregan.yml","es/the-source/authors/ncregan",{"_path":938,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":939,"seo":940,"content":942,"type":517,"slug":951,"_id":952,"_type":46,"title":953,"_source":48,"_file":954,"_stem":955,"_extension":51},"/es/the-source/authors/rschulman",{"layout":11},{"title":941},"Robin Schulman",[943,950],{"componentName":507,"componentContent":944},{"config":945,"name":941,"headshot":947},{"gitlabHandle":946},"robin",{"altText":941,"config":948},{"src":949},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463437/u2xfbudw1f8hhnkrgaoy.webp",{"componentName":516},"rschulman","content:es:the-source:authors:rschulman.yml","Rschulman","es/the-source/authors/rschulman.yml","es/the-source/authors/rschulman",{"_path":957,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":958,"seo":959,"content":961,"type":517,"slug":968,"_id":969,"_type":46,"title":960,"_source":48,"_file":970,"_stem":971,"_extension":51},"/es/the-source/authors/sabrina-farmer",{"layout":11},{"title":960},"Sabrina Farmer",[962,967],{"componentName":507,"componentContent":963},{"name":960,"headshot":964},{"altText":960,"config":965},{"src":966},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463377/udmzbjjr5xrcrffdlphx.webp",{"componentName":516},"sabrina-farmer","content:es:the-source:authors:sabrina-farmer.yml","es/the-source/authors/sabrina-farmer.yml","es/the-source/authors/sabrina-farmer",{"_path":973,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":974,"seo":975,"content":977,"type":517,"slug":986,"_id":987,"_type":46,"title":976,"_source":48,"_file":988,"_stem":989,"_extension":51},"/es/the-source/authors/sandra-gittlen",{"layout":11},{"title":976},"Sandra Gittlen",[978,985],{"componentName":507,"componentContent":979},{"config":980,"name":976,"headshot":982},{"gitlabHandle":981},"sgittlen",{"altText":976,"config":983},{"src":984},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463466/r7ckb9h2zr4c2rsz3zlm.png",{"componentName":516},"sandra-gittlen","content:es:the-source:authors:sandra-gittlen.yml","es/the-source/authors/sandra-gittlen.yml","es/the-source/authors/sandra-gittlen",{"_path":991,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":992,"seo":993,"content":995,"type":517,"slug":1002,"_id":1003,"_type":46,"title":994,"_source":48,"_file":1004,"_stem":1005,"_extension":51},"/es/the-source/authors/sharon-gaudin",{"layout":11},{"title":994},"Sharon Gaudin",[996,1001],{"componentName":507,"componentContent":997},{"name":994,"headshot":998},{"altText":994,"config":999},{"src":1000},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463475/h6j4nnvykzyfzgvl7txb.webp",{"componentName":516},"sharon-gaudin","content:es:the-source:authors:sharon-gaudin.yml","es/the-source/authors/sharon-gaudin.yml","es/the-source/authors/sharon-gaudin",{"_path":1007,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":1008,"seo":1009,"content":1011,"type":517,"slug":1021,"_id":1022,"_type":46,"title":1010,"_source":48,"_file":1023,"_stem":1024,"_extension":51},"/es/the-source/authors/stephen-walters",{"layout":11},{"title":1010},"Stephen Walters",[1012,1020],{"componentName":507,"componentContent":1013},{"config":1014,"name":1010,"headshot":1017},{"gitlabHandle":1015,"linkedInProfileUrl":1016},"swalters1","https://www.linkedin.com/in/1stephenwalters/",{"altText":1010,"config":1018},{"src":1019},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463392/g6ktk5qb4vcqc9wqjlf9.jpg",{"componentName":516},"stephen-walters","content:es:the-source:authors:stephen-walters.yml","es/the-source/authors/stephen-walters.yml","es/the-source/authors/stephen-walters",{"_path":1026,"_dir":501,"_draft":6,"_partial":6,"_locale":7,"config":1027,"seo":1028,"content":1030,"type":517,"slug":1042,"_id":1043,"_type":46,"title":1044,"_source":48,"_file":1045,"_stem":1046,"_extension":51},"/es/the-source/authors/taylor-mccaslin",{"layout":11},{"title":1029},"Taylor McCaslin",[1031,1041],{"componentName":507,"componentContent":1032},{"config":1033,"name":1029,"role":1036,"bio":1037,"headshot":1038},{"gitlabHandle":1034,"linkedInProfileUrl":1035},"tmccaslin","https://www.linkedin.com/in/taylormccaslin/","Gerente de Grupo, Producto, Ciencia de Datos","Taylor McCaslin es el líder de producto para IA/ML en GitLab, donde dirige el equipo de gerentes de producto que gestionan los grupos de etapas con tecnología de IA y de ModelOps. Además, se encarga de establecer la visión y la dirección de cómo permitir que los usuarios de GitLab aprovechen la ciencia de datos como parte de su programa de DevOps. Antes de unirse a GitLab, ocupó cargos en Indeed, Duo Security y WP Engine.",{"altText":1029,"config":1039},{"src":1040},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463427/trfasilaeasosxfcxmsm.jpg",{"componentName":516},"taylor-mccaslin","content:es:the-source:authors:taylor-mccaslin.yml","Taylor Mccaslin","es/the-source/authors/taylor-mccaslin.yml","es/the-source/authors/taylor-mccaslin",1759347883475]