[{"data":1,"prerenderedAt":1025},["ShallowReactive",2],{"/es/the-source/security/security-its-more-than-culture-addressing-the-root-cause-of-common-security/":3,"footer-es":37,"the-source-banner-es":344,"the-source-navigation-es":356,"the-source-newsletter-es":383,"article-site-categories-es":394,"security-its-more-than-culture-addressing-the-root-cause-of-common-security-article-hero-category-es":396,"security-its-more-than-culture-addressing-the-root-cause-of-common-security-the-source-gated-asset-es":419,"security-its-more-than-culture-addressing-the-root-cause-of-common-security-category-es":435,"security-its-more-than-culture-addressing-the-root-cause-of-common-security-the-source-resources-es":447,"security-its-more-than-culture-addressing-the-root-cause-of-common-security-article-hero-author-es":476},{"_path":4,"_dir":5,"_draft":6,"_partial":6,"_locale":7,"config":8,"seo":15,"content":20,"type":29,"category":5,"slug":30,"_id":31,"_type":32,"title":7,"_source":33,"_file":34,"_stem":35,"_extension":36},"/es/the-source/security/security-its-more-than-culture-addressing-the-root-cause-of-common-security","security",false,"",{"layout":9,"template":10,"articleType":11,"author":12,"featured":13,"gatedAsset":14},"the-source","TheSourceArticle","Regular","josh-lemos",true,"application-security-in-the-digital-age",{"title":16,"description":17,"ogImage":18,"config":19},"Abordar el origen de las frustraciones habituales en seguridad","Las frustraciones en seguridad suelen ser culturales, pero también importa la complejidad tecnológica y cómo se gestionan las vulnerabilidades.","https://res.cloudinary.com/about-gitlab-com/image/upload/v1751464489/mragusmxl1wz8ozdaoml.png",{"ignoreTitleCharLimit":13},{"title":16,"date":21,"description":22,"timeToRead":23,"heroImage":18,"keyTakeaways":24,"articleBody":28},"2024-10-29","Las frustraciones en materia de seguridad suelen enmarcarse en una cuestión cultural, pero los responsables también deben centrarse en aspectos como la complejidad de la pila tecnológica y la gestión de vulnerabilidades.","Lectura de 5 min",[25,26,27],"Adoptar el análisis autenticado en la gestión de vulnerabilidades aumenta la eficacia, pero puede desviar los esfuerzos de ingeniería hacia tareas no críticas y crear así una división entre los equipos de seguridad e ingeniería.","Un enfoque minimalista del desarrollo de software puede minimizar las dependencias, reducir las alertas generadas por el análisis de vulnerabilidades y aligerar la carga del desarrollador, lo que contribuye a mejorar la seguridad del software.","La adopción de un enfoque estructurado, que implica patrones de diseño probados y garantizados basados en casos de uso repetibles, puede reducir la carga de los equipos de ingeniería y aumentar la seguridad.","Este año, la [encuesta anual de profesionales de DevSecOps](https://about.gitlab.com/developer-survey/) de GitLab reveló varios problemas relacionados con la cultura organizacional que podrían estar impidiendo una alineación más profunda entre los equipos de ingeniería y seguridad. La mayoría (el 58 %) de los encuestados sobre seguridad dijeron que tienen dificultades para lograr que el departamento de desarrollo priorice la corrección de vulnerabilidades, y el 52 % afirmó que los trámites burocráticos a menudo ralentizan sus esfuerzos para solucionar rápidamente las vulnerabilidades. Además, los encuestados sobre seguridad señalaron varias frustraciones específicas relacionadas con sus trabajos, incluida la dificultad para comprender los hallazgos de seguridad, el exceso de falsos positivos y las pruebas que se realizan al final del proceso de desarrollo de software.\n\n[DevSecOps](/topics/devsecops/) promete una mejor integración entre ingeniería y seguridad, pero está claro que persisten las frustraciones y los desajustes. Esto se debe a que estos desafíos son síntomas de un problema mayor en la forma en que las organizaciones ven la seguridad, así como la forma en que los equipos trabajan juntos y en cómo asignan el tiempo a la seguridad.\n\n## Escapar del círculo vicioso de la vulnerabilidad\n\nEl análisis de vulnerabilidades revela todas las vulnerabilidades potenciales; sin embargo, el hecho de que un paquete de software tenga una vulnerabilidad o exposición común (CVE) no significa que se pueda alcanzar o explotar. Tanto los equipos de seguridad como los desarrolladores siguen clasificando y filtrando los hallazgos de vulnerabilidades que han crecido exponencialmente a lo largo de los años desde que el análisis de vulnerabilidades autenticado se convirtió en la norma.\n\nEl paso al análisis autenticado ha mejorado la eficacia de los programas de seguridad en muchos aspectos, pero también ha metido a los desarrolladores en una rueda interminable de arreglar cosas que no importan. Cuando los equipos desperdician sus esfuerzos en parches que no abordan una vulnerabilidad explotable, se desvían de tareas más críticas, como implementar parches en fallas vulnerables y explotables. Ese es el origen de gran parte de la división entre los equipos de seguridad e ingeniería en la actualidad.\n\nEntonces, ¿cómo pueden las organizaciones abordar la causa raíz de estos problemas y fomentar una mejor integración entre ingeniería y seguridad? Aquí hay tres formas de evitar frustraciones de seguridad comunes en el origen.\n\n### 1. Silenciar el ruido, concentrarse en señales útiles de alta fidelidad\n\nEl exceso de falsos positivos fue la segunda frustración más señalada por los encuestados sobre seguridad en nuestra encuesta. Los falsos positivos son claramente un desafío, pero suelen ser un problema de gestión de vulnerabilidades disfrazado. \n\nSi una organización ve muchos falsos positivos, podría ser una señal de que no han hecho todo lo posible para garantizar que sus hallazgos de seguridad sean de alta fidelidad. Las organizaciones deben centrar sus esfuerzos de seguridad en lo que importa. Eso significa que las soluciones tradicionales de pruebas estáticas de seguridad de las aplicaciones (SAST) probablemente son insuficientes. SAST es una herramienta poderosa, pero pierde gran parte de su valor si los resultados no se pueden manejar o carecen del contexto adecuado. Para que SAST sea lo más eficaz posible, debe utilizarse [a la perfección con otras herramientas de seguridad y desarrollo y ser accesible para los desarrolladores](https://about.gitlab.com/blog/oxeye-joins-gitlab-to-advance-application-security-capabilities/).\n\nOtro problema es que la mayoría de las herramientas de análisis tienen una ventana de contexto muy estrecha para comprender los hallazgos de vulnerabilidades. Esta es una de las áreas en las que la IA puede ayudar con [funcionalidades con tecnología de IA que explican las vulnerabilidades de seguridad](https://about.gitlab.com/es/the-source/ai/understand-and-resolve-vulnerabilities-with-ai-powered-gitlab-duo/).\n\n### 2. Minimizar la pila tecnológica y minimizar la superficie de ataque\n\nLa organización no solo debe centrarse en lo que importa para las pruebas de seguridad, sino en la propia manera en que crea el software.\n\nAunque la IA promete ayudar a simplificar los procesos de desarrollo de software, [según nuestra encuesta, muchas organizaciones aún tienen un largo camino por delante](https://about.gitlab.com/es/the-source/platform/3-surprising-findings-from-our-2024-global-devsecops-survey/). De hecho, las personas entrevistadas que usan IA se mostraron significativamente más propensas que aquellas que no usan IA a querer consolidar su cadena de herramientas, lo que indica que la proliferación de diferentes soluciones específicas que ejecutan diferentes modelos de IA podría estar aumentar la complejidad en lugar de reducirla.\n\nLa complejidad cada vez mayor de las pilas tecnológicas de las organizaciones es un factor importante que contribuye a las frustraciones de seguridad. Cierta complejidad es inevitable al crear grandes sistemas de software multifacéticos. Sin embargo, las organizaciones deben tomar medidas para evitar la complejidad que generan las decisiones de diseño poco óptimas, como el código difícil de mantener y las dependencias redundantes. Esta complejidad innecesaria crea una superficie de ataque más grande y genera más hallazgos de análisis de seguridad que los equipos deben clasificar, priorizar y resolver.\n\nLas organizaciones deben abordar el desarrollo desde la perspectiva de la minimización del software, es decir, prestar especial atención a las herramientas que adoptan y lo que deciden incorporar a sus códigos base. Esto ayudará a minimizar las dependencias, mejorar la seguridad de la cadena de suministro de software, reducir el ruido del análisis y aliviar la carga de los desarrolladores para solucionar problemas no críticos.\n\n### 3. Normalizar la adopción de un enfoque estructurado\n\nLas pruebas de seguridad que se realizan demasiado tarde en el ciclo de desarrollo del software fueron otra de las principales frustraciones identificadas por los encuestados. Los equipos pueden sentirse frustrados cuando quieren enviar algo y se retrasa porque se detecta tarde una vulnerabilidad, pero en muchos casos no habría sido posible detectarla antes. Sin embargo, lo que sí es posible es poner en funcionamiento componentes de seguridad fácilmente desplegables y reutilizables para limitar las variables y las posibles vulnerabilidades\n\nLos equipos pueden evitar sorpresas en las últimas etapas al adoptar [patrones de diseño probados y garantizados basados en casos de uso repetibles](https://about.gitlab.com/the-source/platform/how-devops-and-platform-engineering-turbocharge-efficiency/): el enfoque «estructurado». Un enfoque estructurado es una ruta recomendada, que incluye un conjunto selecto de herramientas, procesos y componentes, que los equipos pueden seguir para crear aplicaciones seguras de manera más eficiente, por ejemplo, usar GitOps para versionar e implementar una infraestructura como código bien diseñada y probada que se implementa a escala para todas las cargas de trabajo. \n\nLa adopción de enfoques estructurados elimina potencialmente cierta flexibilidad, pero finalmente reduce la carga operativa y repetición del trabajo en los equipos de ingeniería, además, aumenta la seguridad. Este debe ser un esfuerzo de colaboración entre los equipos de seguridad y desarrollo. El equipo de seguridad puede ayudar a diseñar enfoques estructurados, pero el de ingeniería debe participar para operar y mantenerlos como parte del código base.\n\n## La seguridad es un dominio, no un equipo{class=\"no-anchor\"}\n\nYa estamos viendo cómo la seguridad como práctica pasa a las manos de los equipos de ingeniería y podemos esperar que los límites entre los equipos continúen difuminándose. Sin embargo, con la rápida adopción de la IA y la correspondiente aceleración del desarrollo de software (el 66 % de las personas encuestadas afirmaron que lanzan software dos veces más rápido o incluso más que el año pasado), será fundamental que las organizaciones establezcan sistemas y marcos que optimicen para obtener el mayor beneficio de seguridad. Por eso, la idea de una desconexión cultural entre el equipo de desarrollo y seguridad no explica la situación entera. Es esencial fomentar una cultura de colaboración, pero los equipos de seguridad e ingeniería también deben trabajar juntos para replantearse aspectos fundamentales del desarrollo de software, como la optimización de los códigos base existentes y la creación de soluciones escalables centradas en la ingeniería que los equipos técnicos de toda la organización puedan adoptar sin problemas.","article","security-its-more-than-culture-addressing-the-root-cause-of-common-security","content:es:the-source:security:security-its-more-than-culture-addressing-the-root-cause-of-common-security:index.yml","yaml","content","es/the-source/security/security-its-more-than-culture-addressing-the-root-cause-of-common-security/index.yml","es/the-source/security/security-its-more-than-culture-addressing-the-root-cause-of-common-security/index","yml",{"_path":38,"_dir":39,"_draft":6,"_partial":6,"_locale":7,"data":40,"_id":340,"_type":32,"title":341,"_source":33,"_file":342,"_stem":343,"_extension":36},"/shared/es/main-footer","es",{"text":41,"source":42,"edit":48,"contribute":53,"config":58,"items":63,"minimal":332},"Git es una marca registrada de Software Freedom Conservancy, y nuestro uso de «GitLab» está bajo licencia",{"text":43,"config":44},"Ver fuente de la página",{"href":45,"dataGaName":46,"dataGaLocation":47},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/","page source","footer",{"text":49,"config":50},"Editar esta página",{"href":51,"dataGaName":52,"dataGaLocation":47},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/content/","web ide",{"text":54,"config":55},"Contribuya",{"href":56,"dataGaName":57,"dataGaLocation":47},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/CONTRIBUTING.md/","please contribute",{"twitter":59,"facebook":60,"youtube":61,"linkedin":62},"https://twitter.com/gitlab","https://www.facebook.com/gitlab","https://www.youtube.com/channel/UCnMGQ8QHMAnVIsI3xJrihhg","https://www.linkedin.com/company/gitlab-com",[64,91,164,232,294],{"title":65,"links":66,"subMenu":72},"Plataforma",[67],{"text":68,"config":69},"Plataforma de DevSecOps",{"href":70,"dataGaName":71,"dataGaLocation":47},"/es/platform/","devsecops platform",[73],{"title":74,"links":75},"Precios",[76,81,86],{"text":77,"config":78},"Ver planes",{"href":79,"dataGaName":80,"dataGaLocation":47},"/es/pricing/","view plans",{"text":82,"config":83},"¿Por qué elegir GitLab Premium?",{"href":84,"dataGaName":85,"dataGaLocation":47},"/es/pricing/premium/","why premium",{"text":87,"config":88},"¿Por qué elegir GitLab Ultimate?",{"href":89,"dataGaName":90,"dataGaLocation":47},"/es/pricing/ultimate/","why ultimate",{"title":92,"links":93},"Soluciones",[94,99,104,109,114,119,124,129,134,139,144,149,154,159],{"text":95,"config":96},"Transformación digital",{"href":97,"dataGaName":98,"dataGaLocation":47},"/es/topics/digital-transformation/","digital transformation",{"text":100,"config":101},"Seguridad y cumplimiento",{"href":102,"dataGaName":103,"dataGaLocation":47},"/solutions/application-security-testing/","Application security testing",{"text":105,"config":106},"Entrega de software automatizada",{"href":107,"dataGaName":108,"dataGaLocation":47},"/es/solutions/delivery-automation/","automated software delivery",{"text":110,"config":111},"Desarrollo ágil",{"href":112,"dataGaName":113,"dataGaLocation":47},"/es/solutions/agile-delivery/","agile delivery",{"text":115,"config":116},"Transformación en la nube",{"href":117,"dataGaName":118,"dataGaLocation":47},"/es/topics/cloud-native/","cloud transformation",{"text":120,"config":121},"Gestión del código fuente",{"href":122,"dataGaName":123,"dataGaLocation":47},"/es/solutions/source-code-management/","source code management",{"text":125,"config":126},"CI/CD",{"href":127,"dataGaName":128,"dataGaLocation":47},"/es/solutions/continuous-integration/","continuous integration & delivery",{"text":130,"config":131},"Gestión del flujo de valor",{"href":132,"dataGaName":133,"dataGaLocation":47},"/es/solutions/value-stream-management/","value stream management",{"text":135,"config":136},"GitOps",{"href":137,"dataGaName":138,"dataGaLocation":47},"/es/solutions/gitops/","gitops",{"text":140,"config":141},"Empresas",{"href":142,"dataGaName":143,"dataGaLocation":47},"/es/enterprise/","enterprise",{"text":145,"config":146},"Pequeñas empresas",{"href":147,"dataGaName":148,"dataGaLocation":47},"/es/small-business/","small business",{"text":150,"config":151},"Sector público",{"href":152,"dataGaName":153,"dataGaLocation":47},"/es/solutions/public-sector/","public sector",{"text":155,"config":156},"Educación",{"href":157,"dataGaName":158,"dataGaLocation":47},"/es/solutions/education/","education",{"text":160,"config":161},"Servicios financieros",{"href":162,"dataGaName":163,"dataGaLocation":47},"/es/solutions/finance/","financial services",{"title":165,"links":166},"Recursos",[167,172,177,182,187,192,197,202,207,212,217,222,227],{"text":168,"config":169},"Instalar",{"href":170,"dataGaName":171,"dataGaLocation":47},"/es/install/","install",{"text":173,"config":174},"Guías de inicio rápido",{"href":175,"dataGaName":176,"dataGaLocation":47},"/es/get-started/","quick setup checklists",{"text":178,"config":179},"Aprender",{"href":180,"dataGaName":181,"dataGaLocation":47},"https://university.gitlab.com/","learn",{"text":183,"config":184},"Documentación del producto",{"href":185,"dataGaName":186,"dataGaLocation":47},"https://docs.gitlab.com/","docs",{"text":188,"config":189},"Blog",{"href":190,"dataGaName":191,"dataGaLocation":47},"/blog/","blog",{"text":193,"config":194},"Historias de éxito del cliente",{"href":195,"dataGaName":196,"dataGaLocation":47},"/customers/","customer success stories",{"text":198,"config":199},"Remoto",{"href":200,"dataGaName":201,"dataGaLocation":47},"https://handbook.gitlab.com/handbook/company/culture/all-remote/","remote",{"text":203,"config":204},"Servicios de GitLab",{"href":205,"dataGaName":206,"dataGaLocation":47},"/es/services/","services",{"text":208,"config":209},"TeamOps",{"href":210,"dataGaName":211,"dataGaLocation":47},"/es/teamops/","teamops",{"text":213,"config":214},"Comunidad",{"href":215,"dataGaName":216,"dataGaLocation":47},"/community/","community",{"text":218,"config":219},"Foro",{"href":220,"dataGaName":221,"dataGaLocation":47},"https://forum.gitlab.com/","forum",{"text":223,"config":224},"Eventos",{"href":225,"dataGaName":226,"dataGaLocation":47},"/events/","events",{"text":228,"config":229},"Socios",{"href":230,"dataGaName":231,"dataGaLocation":47},"/es/partners/","partners",{"title":233,"links":234},"Empresa",[235,240,245,250,255,260,265,269,274,279,284,289],{"text":236,"config":237},"Acerca de nosotros",{"href":238,"dataGaName":239,"dataGaLocation":47},"/es/company/","company",{"text":241,"config":242},"Jobs",{"href":243,"dataGaName":244,"dataGaLocation":47},"/jobs/","jobs",{"text":246,"config":247},"Liderazgo",{"href":248,"dataGaName":249,"dataGaLocation":47},"/company/team/e-group/","leadership",{"text":251,"config":252},"Equipo",{"href":253,"dataGaName":254,"dataGaLocation":47},"/company/team/","team",{"text":256,"config":257},"Manual",{"href":258,"dataGaName":259,"dataGaLocation":47},"https://handbook.gitlab.com/","handbook",{"text":261,"config":262},"Relaciones con los inversores",{"href":263,"dataGaName":264,"dataGaLocation":47},"https://ir.gitlab.com/","investor relations",{"text":266,"config":267},"Sustainability",{"href":268,"dataGaName":266,"dataGaLocation":47},"/sustainability/",{"text":270,"config":271},"Diversidad, inclusión y pertenencia (DIB)",{"href":272,"dataGaName":273,"dataGaLocation":47},"/diversity-inclusion-belonging/","Diversity, inclusion and belonging",{"text":275,"config":276},"Centro de confianza",{"href":277,"dataGaName":278,"dataGaLocation":47},"/es/security/","trust center",{"text":280,"config":281},"Boletín",{"href":282,"dataGaName":283,"dataGaLocation":47},"/company/contact/","newsletter",{"text":285,"config":286},"Prensa",{"href":287,"dataGaName":288,"dataGaLocation":47},"/press/","press",{"text":290,"config":291},"Declaración de transparencia sobre la Ley de Esclavitud Moderna",{"href":292,"dataGaName":293,"dataGaLocation":47},"https://handbook.gitlab.com/handbook/legal/modern-slavery-act-transparency-statement/","modern slavery transparency statement",{"title":295,"links":296},"Comuníquese con nosotros",[297,302,307,312,317,322,327],{"text":298,"config":299},"Contactar con un experto",{"href":300,"dataGaName":301,"dataGaLocation":47},"/es/sales/","sales",{"text":303,"config":304},"Obtener ayuda",{"href":305,"dataGaName":306,"dataGaLocation":47},"/support/","get help",{"text":308,"config":309},"Portal de clientes",{"href":310,"dataGaName":311,"dataGaLocation":47},"https://customers.gitlab.com/customers/sign_in/","customer portal",{"text":313,"config":314},"Estado",{"href":315,"dataGaName":316,"dataGaLocation":47},"https://status.gitlab.com/","status",{"text":318,"config":319},"Términos de uso",{"href":320,"dataGaName":321,"dataGaLocation":47},"/terms/","terms of use",{"text":323,"config":324},"Declaración de privacidad",{"href":325,"dataGaName":326,"dataGaLocation":47},"/es/privacy/","privacy statement",{"text":328,"config":329},"Preferencias de cookies",{"dataGaName":330,"dataGaLocation":47,"id":331,"isOneTrustButton":13},"cookie preferences","ot-sdk-btn",{"items":333},[334,336,338],{"text":318,"config":335},{"href":320,"dataGaName":321,"dataGaLocation":47},{"text":323,"config":337},{"href":325,"dataGaName":326,"dataGaLocation":47},{"text":328,"config":339},{"dataGaName":330,"dataGaLocation":47,"id":331,"isOneTrustButton":13},"content:shared:es:main-footer.yml","Main Footer","shared/es/main-footer.yml","shared/es/main-footer",{"_path":345,"_dir":346,"_draft":6,"_partial":6,"_locale":7,"id":347,"visibility":13,"title":348,"button":349,"_id":353,"_type":32,"_source":33,"_file":354,"_stem":355,"_extension":36},"/shared/es/the-source/banner/the-economics-of-software-innovation-2025-08-18","banner","The Economics of Software Innovation","The Economics of Software Innovation—AI’s $750 Billion Opportunity",{"config":350,"text":352},{"href":351},"https://about.gitlab.com/software-innovation-report/","Get the research report","content:shared:es:the-source:banner:the-economics-of-software-innovation-2025-08-18.yml","shared/es/the-source/banner/the-economics-of-software-innovation-2025-08-18.yml","shared/es/the-source/banner/the-economics-of-software-innovation-2025-08-18",{"_path":357,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"logo":358,"subscribeLink":363,"navItems":367,"_id":379,"_type":32,"title":380,"_source":33,"_file":381,"_stem":382,"_extension":36},"/shared/es/the-source/navigation",{"altText":359,"config":360},"the source logo",{"src":361,"href":362},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1750191004/t7wz1klfb2kxkezksv9t.svg","/es/the-source/",{"text":364,"config":365},"Suscribirse",{"href":366},"#subscribe",[368,372,375],{"text":369,"config":370},"Inteligencia artificial",{"href":371},"/es/the-source/ai/",{"text":100,"config":373},{"href":374},"/es/the-source/security/",{"text":376,"config":377},"Plataforma e infraestructura",{"href":378},"/es/the-source/platform/","content:shared:es:the-source:navigation.yml","Navigation","shared/es/the-source/navigation.yml","shared/es/the-source/navigation",{"_path":384,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"title":385,"description":386,"submitMessage":387,"formData":388,"_id":391,"_type":32,"_source":33,"_file":392,"_stem":393,"_extension":36},"/shared/es/the-source/newsletter","Boletín The Source","Manténgase al día con información sobre el futuro del desarrollo de software.","Se ha suscrito correctamente al boletín The Source.",{"config":389},{"formId":390,"formName":283,"hideRequiredLabel":13},28470,"content:shared:es:the-source:newsletter.yml","shared/es/the-source/newsletter.yml","shared/es/the-source/newsletter",{"categoryNames":395},{"ai":369,"platform":376,"security":100},{"_path":397,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"config":398,"seo":399,"content":401,"type":415,"slug":5,"_id":416,"_type":32,"title":7,"_source":33,"_file":417,"_stem":418,"_extension":36},"/es/the-source/security",{"layout":9},{"title":100,"description":400,"ogImage":7},"Infórmese sobre cómo las organizaciones pueden mantenerse actualizadas respecto a la evolución de las amenazas de seguridad y los requisitos de cumplimiento.",[402,408],{"componentName":403,"componentContent":404},"TheSourceCategoryHero",{"title":100,"description":400,"image":405},{"config":406},{"src":407},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463273/aplkxrvwpii26xao5yhi.png",{"componentName":409,"componentContent":410},"TheSourceCategoryMainSection",{"config":411},{"gatedAssets":412},[413,414,14],"source-lp-guide-to-dynamic-sboms","source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain","category","content:es:the-source:security:index.yml","es/the-source/security/index.yml","es/the-source/security/index",{"_path":420,"_dir":421,"_draft":6,"_partial":6,"_locale":7,"config":422,"title":424,"description":425,"link":426,"_id":432,"_type":32,"_source":33,"_file":433,"_stem":434,"_extension":36},"/shared/es/the-source/gated-assets/application-security-in-the-digital-age","gated-assets",{"id":14,"formId":423},1002,"Seguridad de las aplicaciones en la era digital","Lea los [resultados de la encuesta de más de 5000 profesionales de DevSecOps en todo el mundo](https://about.gitlab.com/developer-survey/2024/security-compliance/) para obtener información sobre cómo las organizaciones están lidiando con el aumento de las superficies de ataque y cambiando el comportamiento hacia la seguridad y la IA.",{"text":427,"config":428},"Leer el informe",{"href":429,"dataGaName":430,"dataGaLocation":431},"https://about.gitlab.com/developer-survey/2024/security-compliance","Application Security in the Digital Age","thesource","content:shared:es:the-source:gated-assets:application-security-in-the-digital-age.yml","shared/es/the-source/gated-assets/application-security-in-the-digital-age.yml","shared/es/the-source/gated-assets/application-security-in-the-digital-age",{"_path":397,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"config":436,"seo":437,"content":438,"type":415,"slug":5,"_id":416,"_type":32,"title":7,"_source":33,"_file":417,"_stem":418,"_extension":36},{"layout":9},{"title":100,"description":400,"ogImage":7},[439,443],{"componentName":403,"componentContent":440},{"title":100,"description":400,"image":441},{"config":442},{"src":407},{"componentName":409,"componentContent":444},{"config":445},{"gatedAssets":446},[413,414,14],[448,452,463],{"_path":420,"_dir":421,"_draft":6,"_partial":6,"_locale":7,"config":449,"title":424,"description":425,"link":450,"_id":432,"_type":32,"_source":33,"_file":433,"_stem":434,"_extension":36},{"id":14,"formId":423},{"text":427,"config":451},{"href":429,"dataGaName":430,"dataGaLocation":431},{"_path":453,"_dir":421,"_draft":6,"_partial":6,"_locale":7,"config":454,"title":455,"link":456,"_id":460,"_type":32,"_source":33,"_file":461,"_stem":462,"_extension":36},"/shared/es/the-source/gated-assets/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain",{"id":414},"Una guía de campo para los vectores de amenazas en la cadena de suministro de software",{"config":457},{"href":458,"dataGaName":459,"dataGaLocation":431},"https://about.gitlab.com/the-source/security/field-guide-to-threat-vectors-in-the-software-supply-chain/","A field guide to threat vectors in the software supply chain","content:shared:es:the-source:gated-assets:source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain.yml","shared/es/the-source/gated-assets/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain.yml","shared/es/the-source/gated-assets/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain",{"_path":464,"_dir":421,"_draft":6,"_partial":6,"_locale":7,"config":465,"title":466,"description":467,"link":468,"_id":473,"_type":32,"_source":33,"_file":474,"_stem":475,"_extension":36},"/shared/es/the-source/gated-assets/source-lp-guide-to-dynamic-sboms",{"id":413},"Guía de GitLab para SBOM dinámicos: un elemento integral del desarrollo de software moderno","Descubre cómo obtener visibilidad sobre riesgos organizacionales previamente no identificados mediante una lista de materiales de software (SBOM).",{"text":469,"config":470},"Leer la guía",{"href":471,"dataGaName":472,"dataGaLocation":431},"https://about.gitlab.com/the-source/security/guide-to-dynamic-sboms/","Guide to Dynamic SBOMs","content:shared:es:the-source:gated-assets:source-lp-guide-to-dynamic-sboms.yml","shared/es/the-source/gated-assets/source-lp-guide-to-dynamic-sboms.yml","shared/es/the-source/gated-assets/source-lp-guide-to-dynamic-sboms",[477,500,516,532,548,569,589,605,623,643,660,681,697,715,732,750,769,787,806,827,847,863,879,897,915,934,950,968,984,1003],{"_path":478,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":480,"seo":481,"content":483,"type":495,"slug":496,"_id":497,"_type":32,"title":482,"_source":33,"_file":498,"_stem":499,"_extension":36},"/es/the-source/authors/amanda-rueda","authors",{"layout":9},{"title":482},"Amanda Rueda",[484,493],{"componentName":485,"componentContent":486},"TheSourceAuthorHero",{"config":487,"name":482,"headshot":490},{"gitlabHandle":488,"linkedInProfileUrl":489},"amandarueda","https://www.linkedin.com/in/amandamrueda/",{"altText":482,"config":491},{"src":492},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463383/osecw1pzbxvb7fhqhiky.png",{"componentName":494},"TheSourceArticlesList","author","amanda-rueda","content:es:the-source:authors:amanda-rueda.yml","es/the-source/authors/amanda-rueda.yml","es/the-source/authors/amanda-rueda",{"_path":501,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":502,"seo":503,"content":505,"type":495,"slug":512,"_id":513,"_type":32,"title":504,"_source":33,"_file":514,"_stem":515,"_extension":36},"/es/the-source/authors/andre-michael-braun",{"layout":9},{"title":504},"Andre Michael Braun",[506,511],{"componentName":485,"componentContent":507},{"name":504,"headshot":508},{"altText":504,"config":509},{"src":510},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463336/yl27k7wdlnkzsizwknn1.jpg",{"componentName":494},"andre-michael-braun","content:es:the-source:authors:andre-michael-braun.yml","es/the-source/authors/andre-michael-braun.yml","es/the-source/authors/andre-michael-braun",{"_path":517,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":518,"seo":519,"content":521,"type":495,"slug":528,"_id":529,"_type":32,"title":520,"_source":33,"_file":530,"_stem":531,"_extension":36},"/es/the-source/authors/andrew-haschka",{"layout":9},{"title":520},"Andrew Haschka",[522,527],{"componentName":485,"componentContent":523},{"name":520,"headshot":524},{"altText":520,"config":525},{"src":526},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463349/z1qnc4uxmqgg3hnm3da4.png",{"componentName":494},"andrew-haschka","content:es:the-source:authors:andrew-haschka.yml","es/the-source/authors/andrew-haschka.yml","es/the-source/authors/andrew-haschka",{"_path":533,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":534,"seo":535,"content":537,"type":495,"slug":544,"_id":545,"_type":32,"title":536,"_source":33,"_file":546,"_stem":547,"_extension":36},"/es/the-source/authors/ayoub-fandi",{"layout":9},{"title":536},"Ayoub Fandi",[538,543],{"componentName":485,"componentContent":539},{"name":536,"headshot":540},{"altText":536,"config":541},{"src":542},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463329/wyp554loeyoibx3ozren.jpg",{"componentName":494},"ayoub-fandi","content:es:the-source:authors:ayoub-fandi.yml","es/the-source/authors/ayoub-fandi.yml","es/the-source/authors/ayoub-fandi",{"_path":549,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":550,"seo":551,"content":553,"type":495,"slug":565,"_id":566,"_type":32,"title":552,"_source":33,"_file":567,"_stem":568,"_extension":36},"/es/the-source/authors/brian-wald",{"layout":9},{"title":552},"Brian Wald",[554,564],{"componentName":485,"componentContent":555},{"config":556,"name":552,"role":559,"bio":560,"headshot":561},{"gitlabHandle":557,"linkedInProfileUrl":558},"brianwald","https://www.linkedin.com/in/brianwald/","Jefe de la Organización Global de CTO de Campo","Brian Wald es el jefe de la organización global de CTO de campo en GitLab. Lidera un equipo dinámico de CTO de campo dedicado a transformar las prácticas de desarrollo de software empresarial.",{"altText":552,"config":562},{"src":563},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463417/fugpbux9miqbdx3wewtu.jpg",{"componentName":494},"brian-wald","content:es:the-source:authors:brian-wald.yml","es/the-source/authors/brian-wald.yml","es/the-source/authors/brian-wald",{"_path":570,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":571,"seo":572,"content":574,"type":495,"slug":585,"_id":586,"_type":32,"title":573,"_source":33,"_file":587,"_stem":588,"_extension":36},"/es/the-source/authors/bryan-ross",{"layout":9},{"title":573},"Bryan Ross",[575,584],{"componentName":485,"componentContent":576},{"config":577,"name":573,"headshot":581},{"gitlabHandle":578,"twitterXProfileUrl":579,"linkedInProfileUrl":580},"bryanrossuk","https://twitter.com/bryanrossuk","https://www.linkedin.com/in/bryanross",{"altText":573,"config":582},{"src":583},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463324/mvdyvskii4hltdrgqxom.jpg",{"componentName":494},"bryan-ross","content:es:the-source:authors:bryan-ross.yml","es/the-source/authors/bryan-ross.yml","es/the-source/authors/bryan-ross",{"_path":590,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":591,"seo":592,"content":594,"type":495,"slug":601,"_id":602,"_type":32,"title":593,"_source":33,"_file":603,"_stem":604,"_extension":36},"/es/the-source/authors/chandler-gibbons",{"layout":9},{"title":593},"Chandler Gibbons",[595,600],{"componentName":485,"componentContent":596},{"name":593,"headshot":597},{"altText":593,"config":598},{"src":599},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463362/o7g9fqtqtjvegfwniuxh.jpg",{"componentName":494},"chandler-gibbons","content:es:the-source:authors:chandler-gibbons.yml","es/the-source/authors/chandler-gibbons.yml","es/the-source/authors/chandler-gibbons",{"_path":606,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":607,"seo":608,"content":610,"type":495,"slug":619,"_id":620,"_type":32,"title":609,"_source":33,"_file":621,"_stem":622,"_extension":36},"/es/the-source/authors/dave-steer",{"layout":9},{"title":609},"Dave Steer",[611,618],{"componentName":485,"componentContent":612},{"config":613,"name":609,"headshot":615},{"gitlabHandle":614},"dsteer",{"altText":609,"config":616},{"src":617},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463457/zbtapdkglu3yb9suaq7w.png",{"componentName":494},"dave-steer","content:es:the-source:authors:dave-steer.yml","es/the-source/authors/dave-steer.yml","es/the-source/authors/dave-steer",{"_path":624,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":625,"seo":626,"content":628,"type":495,"slug":638,"_id":639,"_type":32,"title":640,"_source":33,"_file":641,"_stem":642,"_extension":36},"/es/the-source/authors/ddesanto",{"layout":9},{"title":627},"David DeSanto",[629,637],{"componentName":485,"componentContent":630},{"config":631,"name":627,"headshot":634},{"gitlabHandle":632,"linkedInProfileUrl":633},"david","https://www.linkedin.com/in/ddesanto/",{"altText":627,"config":635},{"src":636},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463446/bgnljs84zcsxj0t6nvix.png",{"componentName":494},"ddesanto","content:es:the-source:authors:ddesanto.yml","Ddesanto","es/the-source/authors/ddesanto.yml","es/the-source/authors/ddesanto",{"_path":644,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":645,"seo":646,"content":648,"type":495,"slug":655,"_id":656,"_type":32,"title":657,"_source":33,"_file":658,"_stem":659,"_extension":36},"/es/the-source/authors/derek-debellis",{"layout":9},{"title":647},"Derek DeBellis",[649,654],{"componentName":485,"componentContent":650},{"name":647,"headshot":651},{"altText":647,"config":652},{"src":653},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463385/sbnjwfaguszi5g2smzr7.png",{"componentName":494},"derek-debellis","content:es:the-source:authors:derek-debellis.yml","Derek Debellis","es/the-source/authors/derek-debellis.yml","es/the-source/authors/derek-debellis",{"_path":661,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":662,"seo":663,"content":665,"type":495,"slug":677,"_id":678,"_type":32,"title":664,"_source":33,"_file":679,"_stem":680,"_extension":36},"/es/the-source/authors/emilio-salvador",{"layout":9},{"title":664},"Emilio Salvador",[666,676],{"componentName":485,"componentContent":667},{"config":668,"name":664,"role":671,"bio":672,"headshot":673},{"gitlabHandle":669,"linkedInProfileUrl":670},"esalvadorp","https://www.linkedin.com/in/emiliosp/","Vicepresidente de Estrategia y Relaciones con Desarrolladores","Emilio Salvador es vicepresidente de estrategia y relaciones con desarrolladores en GitLab. Ejecutivo en tecnología con más de 20 años de experiencia, Emilio ha desempeñado cargos en Amazon y Microsoft, y recientemente dirigió la estrategia y las operaciones del equipo de promoción y experiencia de desarrolladores de Google. Tiene una maestría (MBA) de la MIT Sloan School of Management.",{"altText":664,"config":674},{"src":675},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463402/g0snp3uisjm4tj3pkqcw.jpg",{"componentName":494},"emilio-salvador","content:es:the-source:authors:emilio-salvador.yml","es/the-source/authors/emilio-salvador.yml","es/the-source/authors/emilio-salvador",{"_path":682,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":683,"seo":684,"content":686,"type":495,"slug":693,"_id":694,"_type":32,"title":685,"_source":33,"_file":695,"_stem":696,"_extension":36},"/es/the-source/authors/erika-feldman",{"layout":9},{"title":685},"Erika Feldman",[687,692],{"componentName":485,"componentContent":688},{"name":685,"headshot":689},{"altText":685,"config":690},{"src":691},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463354/d9quqvz7d2ayjwif7vdn.png",{"componentName":494},"erika-feldman","content:es:the-source:authors:erika-feldman.yml","es/the-source/authors/erika-feldman.yml","es/the-source/authors/erika-feldman",{"_path":698,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":699,"seo":700,"content":702,"type":495,"slug":711,"_id":712,"_type":32,"title":701,"_source":33,"_file":713,"_stem":714,"_extension":36},"/es/the-source/authors/george-kichukov",{"layout":9},{"title":701},"George Kichukov",[703,710],{"componentName":485,"componentContent":704},{"config":705,"name":701,"headshot":707},{"gitlabHandle":706},"gkichukov",{"altText":701,"config":708},{"src":709},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463366/dk2knfancgsxocjkmyoa.jpg",{"componentName":494},"george-kichukov","content:es:the-source:authors:george-kichukov.yml","es/the-source/authors/george-kichukov.yml","es/the-source/authors/george-kichukov",{"_path":716,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":717,"seo":718,"content":720,"type":495,"slug":727,"_id":728,"_type":32,"title":729,"_source":33,"_file":730,"_stem":731,"_extension":36},"/es/the-source/authors/gitlab",{"layout":9},{"title":719},"GitLab",[721,726],{"componentName":485,"componentContent":722},{"name":719,"headshot":723},{"altText":719,"config":724},{"src":725},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463461/ts7io0hgpdyqylbzfire.png",{"componentName":494},"gitlab","content:es:the-source:authors:gitlab.yml","Gitlab","es/the-source/authors/gitlab.yml","es/the-source/authors/gitlab",{"_path":733,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":734,"seo":735,"content":737,"type":495,"slug":746,"_id":747,"_type":32,"title":736,"_source":33,"_file":748,"_stem":749,"_extension":36},"/es/the-source/authors/grant-hickman",{"layout":9},{"title":736},"Grant Hickman",[738,745],{"componentName":485,"componentContent":739},{"config":740,"name":736,"headshot":742},{"gitlabHandle":741},"g.hickman",{"altText":736,"config":743},{"src":744},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463463/f3uqwtugqotyhwutz5gu.png",{"componentName":494},"grant-hickman","content:es:the-source:authors:grant-hickman.yml","es/the-source/authors/grant-hickman.yml","es/the-source/authors/grant-hickman",{"_path":751,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":752,"seo":753,"content":755,"type":495,"slug":765,"_id":766,"_type":32,"title":754,"_source":33,"_file":767,"_stem":768,"_extension":36},"/es/the-source/authors/haim-snir",{"layout":9},{"title":754},"Haim Snir",[756,764],{"componentName":485,"componentContent":757},{"config":758,"name":754,"headshot":761},{"gitlabHandle":759,"linkedInProfileUrl":760},"hsnir1","https://www.linkedin.com/in/haimsnir/",{"altText":754,"config":762},{"src":763},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463395/nubmshvaq8wpomopllni.png",{"componentName":494},"haim-snir","content:es:the-source:authors:haim-snir.yml","es/the-source/authors/haim-snir.yml","es/the-source/authors/haim-snir",{"_path":770,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":771,"seo":772,"content":774,"type":495,"slug":778,"_id":783,"_type":32,"title":784,"_source":33,"_file":785,"_stem":786,"_extension":36},"/es/the-source/authors/iganbaruch",{"layout":9},{"title":773},"Itzik Gan Baruch",[775,782],{"componentName":485,"componentContent":776},{"config":777,"name":773,"headshot":779},{"gitlabHandle":778},"iganbaruch",{"altText":773,"config":780},{"src":781},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463443/vibb2fkc0ojni2d1eqde.png",{"componentName":494},"content:es:the-source:authors:iganbaruch.yml","Iganbaruch","es/the-source/authors/iganbaruch.yml","es/the-source/authors/iganbaruch",{"_path":788,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":789,"seo":790,"content":792,"type":495,"slug":801,"_id":802,"_type":32,"title":803,"_source":33,"_file":804,"_stem":805,"_extension":36},"/es/the-source/authors/jlongo",{"layout":9},{"title":791},"Joseph Longo",[793,800],{"componentName":485,"componentContent":794},{"config":795,"name":791,"headshot":797},{"gitlabHandle":796},"jlongo_gitlab",{"altText":791,"config":798},{"src":799},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463434/uoxaknpmoposbbgzqji8.png",{"componentName":494},"jlongo","content:es:the-source:authors:jlongo.yml","Jlongo","es/the-source/authors/jlongo.yml","es/the-source/authors/jlongo",{"_path":807,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":808,"seo":809,"content":811,"type":495,"slug":823,"_id":824,"_type":32,"title":810,"_source":33,"_file":825,"_stem":826,"_extension":36},"/es/the-source/authors/joel-krooswyk",{"layout":9},{"title":810},"Joel Krooswyk",[812,822],{"componentName":485,"componentContent":813},{"config":814,"name":810,"role":817,"bio":818,"headshot":819},{"gitlabHandle":815,"linkedInProfileUrl":816},"jkrooswyk","https://www.linkedin.com/in/joelrkrooswyk/","Director de tecnología federal","Joel Krooswyk es el director de Tecnología federal en GitLab. Ha participado activamente en el crecimiento de GitLab desde 2017. Sus 25 años de experiencia en liderazgo abarcan no solo el sector público de Estados Unidos, sino también pequeñas, medianas y grandes empresas a nivel mundial. Joel combina una profunda experiencia en políticas gubernamentales con un amplio conocimiento en tecnología, desarrollo de software, inteligencia artificial y ciberseguridad. La industria y las agencias a menudo le piden sus comentarios y respuestas sobre políticas.",{"altText":810,"config":820},{"src":821},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463423/mkmdhuxsjggfvokdmdv7.jpg",{"componentName":494},"joel-krooswyk","content:es:the-source:authors:joel-krooswyk.yml","es/the-source/authors/joel-krooswyk.yml","es/the-source/authors/joel-krooswyk",{"_path":828,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":829,"seo":830,"content":832,"type":495,"slug":12,"_id":844,"_type":32,"title":831,"_source":33,"_file":845,"_stem":846,"_extension":36},"/es/the-source/authors/josh-lemos",{"layout":9},{"title":831},"Josh Lemos",[833,843],{"componentName":485,"componentContent":834},{"config":835,"name":831,"role":838,"bio":839,"headshot":840},{"gitlabHandle":836,"linkedInProfileUrl":837},"joshlemos","https://www.linkedin.com/in/joshlemos/","Director de Seguridad de la Información","Josh Lemos es director de Seguridad de la Información en GitLab Inc. Sus 20 años de experiencia dirigiendo equipos de seguridad de la información lo convierten una parte fundamental del equipo. Su responsabilidad incluye definir y mantener la visión, la estrategia y el programa de la empresa para garantizar la protección de los activos y las tecnologías de la información, fortalecer la plataforma de DevSecOps de GitLab y garantizar el máximo nivel de seguridad para los clientes.",{"altText":831,"config":841},{"src":842},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463405/f4rqtiecakrekvxfhqar.jpg",{"componentName":494},"content:es:the-source:authors:josh-lemos.yml","es/the-source/authors/josh-lemos.yml","es/the-source/authors/josh-lemos",{"_path":848,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":849,"seo":850,"content":852,"type":495,"slug":859,"_id":860,"_type":32,"title":851,"_source":33,"_file":861,"_stem":862,"_extension":36},"/es/the-source/authors/julie-griffin",{"layout":9},{"title":851},"Julie Griffin",[853,858],{"componentName":485,"componentContent":854},{"name":851,"headshot":855},{"altText":851,"config":856},{"src":857},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463371/hqkbr3uk8hw2de7tltn4.webp",{"componentName":494},"julie-griffin","content:es:the-source:authors:julie-griffin.yml","es/the-source/authors/julie-griffin.yml","es/the-source/authors/julie-griffin",{"_path":864,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":865,"seo":866,"content":868,"type":495,"slug":875,"_id":876,"_type":32,"title":867,"_source":33,"_file":877,"_stem":878,"_extension":36},"/es/the-source/authors/kristina-weis",{"layout":9},{"title":867},"Kristina Weis",[869,874],{"componentName":485,"componentContent":870},{"name":867,"headshot":871},{"altText":867,"config":872},{"src":873},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463469/eoolq6n6bs0zb8gmf0js.webp",{"componentName":494},"kristina-weis","content:es:the-source:authors:kristina-weis.yml","es/the-source/authors/kristina-weis.yml","es/the-source/authors/kristina-weis",{"_path":880,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":881,"seo":882,"content":884,"type":495,"slug":893,"_id":894,"_type":32,"title":883,"_source":33,"_file":895,"_stem":896,"_extension":36},"/es/the-source/authors/lee-faus",{"layout":9},{"title":883},"Lee Faus",[885,892],{"componentName":485,"componentContent":886},{"config":887,"name":883,"headshot":889},{"gitlabHandle":888},"lfaus",{"altText":883,"config":890},{"src":891},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463398/vivhlomglvnstamj54bo.jpg",{"componentName":494},"lee-faus","content:es:the-source:authors:lee-faus.yml","es/the-source/authors/lee-faus.yml","es/the-source/authors/lee-faus",{"_path":898,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":899,"seo":900,"content":902,"type":495,"slug":906,"_id":911,"_type":32,"title":912,"_source":33,"_file":913,"_stem":914,"_extension":36},"/es/the-source/authors/ncregan",{"layout":9},{"title":901},"Niall Cregan",[903,910],{"componentName":485,"componentContent":904},{"config":905,"name":901,"headshot":907},{"gitlabHandle":906},"ncregan",{"altText":901,"config":908},{"src":909},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463431/yrtwodocb4cu3j7lkhyo.png",{"componentName":494},"content:es:the-source:authors:ncregan.yml","Ncregan","es/the-source/authors/ncregan.yml","es/the-source/authors/ncregan",{"_path":916,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":917,"seo":918,"content":920,"type":495,"slug":929,"_id":930,"_type":32,"title":931,"_source":33,"_file":932,"_stem":933,"_extension":36},"/es/the-source/authors/rschulman",{"layout":9},{"title":919},"Robin Schulman",[921,928],{"componentName":485,"componentContent":922},{"config":923,"name":919,"headshot":925},{"gitlabHandle":924},"robin",{"altText":919,"config":926},{"src":927},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463437/u2xfbudw1f8hhnkrgaoy.webp",{"componentName":494},"rschulman","content:es:the-source:authors:rschulman.yml","Rschulman","es/the-source/authors/rschulman.yml","es/the-source/authors/rschulman",{"_path":935,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":936,"seo":937,"content":939,"type":495,"slug":946,"_id":947,"_type":32,"title":938,"_source":33,"_file":948,"_stem":949,"_extension":36},"/es/the-source/authors/sabrina-farmer",{"layout":9},{"title":938},"Sabrina Farmer",[940,945],{"componentName":485,"componentContent":941},{"name":938,"headshot":942},{"altText":938,"config":943},{"src":944},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463377/udmzbjjr5xrcrffdlphx.webp",{"componentName":494},"sabrina-farmer","content:es:the-source:authors:sabrina-farmer.yml","es/the-source/authors/sabrina-farmer.yml","es/the-source/authors/sabrina-farmer",{"_path":951,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":952,"seo":953,"content":955,"type":495,"slug":964,"_id":965,"_type":32,"title":954,"_source":33,"_file":966,"_stem":967,"_extension":36},"/es/the-source/authors/sandra-gittlen",{"layout":9},{"title":954},"Sandra Gittlen",[956,963],{"componentName":485,"componentContent":957},{"config":958,"name":954,"headshot":960},{"gitlabHandle":959},"sgittlen",{"altText":954,"config":961},{"src":962},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463466/r7ckb9h2zr4c2rsz3zlm.png",{"componentName":494},"sandra-gittlen","content:es:the-source:authors:sandra-gittlen.yml","es/the-source/authors/sandra-gittlen.yml","es/the-source/authors/sandra-gittlen",{"_path":969,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":970,"seo":971,"content":973,"type":495,"slug":980,"_id":981,"_type":32,"title":972,"_source":33,"_file":982,"_stem":983,"_extension":36},"/es/the-source/authors/sharon-gaudin",{"layout":9},{"title":972},"Sharon Gaudin",[974,979],{"componentName":485,"componentContent":975},{"name":972,"headshot":976},{"altText":972,"config":977},{"src":978},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463475/h6j4nnvykzyfzgvl7txb.webp",{"componentName":494},"sharon-gaudin","content:es:the-source:authors:sharon-gaudin.yml","es/the-source/authors/sharon-gaudin.yml","es/the-source/authors/sharon-gaudin",{"_path":985,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":986,"seo":987,"content":989,"type":495,"slug":999,"_id":1000,"_type":32,"title":988,"_source":33,"_file":1001,"_stem":1002,"_extension":36},"/es/the-source/authors/stephen-walters",{"layout":9},{"title":988},"Stephen Walters",[990,998],{"componentName":485,"componentContent":991},{"config":992,"name":988,"headshot":995},{"gitlabHandle":993,"linkedInProfileUrl":994},"swalters1","https://www.linkedin.com/in/1stephenwalters/",{"altText":988,"config":996},{"src":997},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463392/g6ktk5qb4vcqc9wqjlf9.jpg",{"componentName":494},"stephen-walters","content:es:the-source:authors:stephen-walters.yml","es/the-source/authors/stephen-walters.yml","es/the-source/authors/stephen-walters",{"_path":1004,"_dir":479,"_draft":6,"_partial":6,"_locale":7,"config":1005,"seo":1006,"content":1008,"type":495,"slug":1020,"_id":1021,"_type":32,"title":1022,"_source":33,"_file":1023,"_stem":1024,"_extension":36},"/es/the-source/authors/taylor-mccaslin",{"layout":9},{"title":1007},"Taylor McCaslin",[1009,1019],{"componentName":485,"componentContent":1010},{"config":1011,"name":1007,"role":1014,"bio":1015,"headshot":1016},{"gitlabHandle":1012,"linkedInProfileUrl":1013},"tmccaslin","https://www.linkedin.com/in/taylormccaslin/","Gerente de Grupo, Producto, Ciencia de Datos","Taylor McCaslin es el líder de producto para IA/ML en GitLab, donde dirige el equipo de gerentes de producto que gestionan los grupos de etapas con tecnología de IA y de ModelOps. Además, se encarga de establecer la visión y la dirección de cómo permitir que los usuarios de GitLab aprovechen la ciencia de datos como parte de su programa de DevOps. Antes de unirse a GitLab, ocupó cargos en Indeed, Duo Security y WP Engine.",{"altText":1007,"config":1017},{"src":1018},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463427/trfasilaeasosxfcxmsm.jpg",{"componentName":494},"taylor-mccaslin","content:es:the-source:authors:taylor-mccaslin.yml","Taylor Mccaslin","es/the-source/authors/taylor-mccaslin.yml","es/the-source/authors/taylor-mccaslin",1758292833932]