[{"data":1,"prerenderedAt":1015},["ShallowReactive",2],{"/es/the-source/security/strengthen-your-cybersecurity-strategy-with-secure-by-design/":3,"footer-es":36,"the-source-navigation-es":344,"the-source-newsletter-es":371,"article-site-categories-es":383,"undefined-article-hero-category-es":385,"undefined-the-source-gated-asset-es":410,"undefined-category-es":427,"undefined-the-source-resources-es":440,"undefined-article-hero-author-es":466},{"_path":4,"_dir":5,"_draft":6,"_partial":6,"_locale":7,"config":8,"seo":14,"content":18,"type":28,"category":5,"slug":29,"_id":30,"_type":31,"title":7,"_source":32,"_file":33,"_stem":34,"_extension":35},"/es/the-source/security/strengthen-your-cybersecurity-strategy-with-secure-by-design","security",false,"",{"layout":9,"template":10,"articleType":11,"author":12,"featured":6,"gatedAsset":13},"the-source","TheSourceArticle","Regular","joel-krooswyk","source-lp-guide-to-dynamic-sboms",{"title":15,"description":16,"ogImage":17},"Refuerce su ciberseguridad con Secure by Design | GitLab","Consulte los principios de Secure by Design y conceptos relacionados, y descubra qué implementar para integrar la seguridad en el desarrollo de software.","https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463932/pnfdgovoaq5qd1yprxuc.png",{"title":19,"date":20,"description":21,"timeToRead":22,"heroImage":17,"keyTakeaways":23,"articleBody":27},"Fortalezca su estrategia de ciberseguridad con el concepto Secure by Design","2024-10-29","Eche un vistazo más de cerca a los principios de Secure by Design y a los conceptos relacionados, y descubra las medidas que puede implementar hoy para integrar la seguridad en sus procesos de desarrollo de software.","Lectura de 6 min",[24,25,26],"Secure by Design, Secure by Default y Secure by Demand previenen vulnerabilidades y ataques a la cadena de suministro de software, animando a fabricantes tecnológicos a integrar la seguridad en todos los aspectos del diseño y desarrollo de productos.","Adoptar un enfoque integral de DevSecOps y crear y mantener listas de materiales de software (SBOM) son medidas clave para cumplir con los principios de Secure by Design.","La integración de la IA en el ciclo de desarrollo de software también puede acelerar los procesos de desarrollo, fortalecer la seguridad y facilitar la resolución de vulnerabilidades.","El enfoque de una organización con respecto a la ciberseguridad debe evolucionar constantemente a medida que aumentan las superficies de ataque y se adquiere más conocimiento sobre las amenazas potenciales. Al comprender que las amenazas pueden provenir de cualquier punto de la cadena de suministro de software, el enfoque Secure by Design integra la seguridad en las fases de diseño, programación, prueba e implementación del desarrollo de software. Como estándar para las agencias federales de Estados Unidos, y para cualquier organización que utilice su software, el enfoque Secure by Design se ha convertido en un verdadero punto de referencia para integrar la seguridad en el ciclo de desarrollo de software.\n\nCon el tiempo, el concepto Secure by Design se ha diversificado en conceptos relacionados como _Secure by Default_ y _Secure by Demand_, que enfatizan diferentes estrategias para implementar los principios de Secure by Design:\n\n- [Secure by Default](#en-que-consiste-el-concepto-secure-by-default) se centra en garantizar que todos los productos de software sean seguros desde el primer momento.\n- [Secure by Demand](#en-que-consiste-el-concepto-secure-by-demand) amplía los principios del concepto Secure by Design al proceso de adquisiciones.\n\nA continuación, presentamos un análisis más detallado de los principios de Secure by Design y de estos enfoques relacionados, así como una [guía paso a paso](#desarrollar-una-estrategia-de-ciberseguridad-que-cumpla-con-los-principios-de-Secure-by-Design) sobre cómo las organizaciones pueden adaptar sus estrategias para prevenir vulnerabilidades explotables y ataques a la cadena de suministro de software.\n\n## ¿En qué consiste el concepto Secure by Design?\nLa Agencia de Ciberseguridad y Seguridad de Infraestructura (CISA) de los Estados Unidos presentó su [Iniciativa Secure by Design](https://www.cisa.gov/securebydesign) en abril de 2023, con un enfoque en tres principios clave de seguridad de software: \n\n1. Asumir la responsabilidad de los resultados de seguridad del cliente\n1. Adoptar la transparencia y la rendición de cuentas radicales\n1. Establecer una estructura organizativa y un liderazgo para lograr estos objetivos\n\nEl concepto Secure by Design integra principios y protocolos de seguridad en cada etapa del proceso de desarrollo de software. Esto significa que las medidas de seguridad se integran en las fases de diseño, programación, pruebas e implementación del desarrollo de software, en lugar de añadirse como un aspecto secundario.\n\nEl objetivo del concepto Secure by Design es crear una estructura segura para el software desde el principio, reduciendo así las vulnerabilidades y superficies de ataque potenciales.### ¿En qué consiste el concepto Secure by Default?\nSecure by Default es una rama de Secure by Design que se centra en garantizar que cualquier software o hardware se configure en su forma más segura sin que el usuario deba realizar ajustes adicionales. Los productos que implementan los principios de Secure by Default habilitan automáticamente los controles de seguridad más importantes necesarios para proteger a las organizaciones contra el acceso no autorizado por parte de actores malintencionados. Esto significa que significa que los usuarios no tienen tomar medidas adicionales para garantizar que un producto esté protegido contra las técnicas de explotación más comunes.\n\nLas políticas de Secure by Default incluyen la eliminación de contraseñas predeterminadas y la obligatoriedad de la autenticación multifactor y el inicio de sesión único para permitir que solo los usuarios autorizados accedan a los recursos. Este enfoque también incluye actualizaciones y parches automáticos, así como configuraciones seguras para todas las cuentas de usuario y dispositivos.\n\n### ¿En qué consiste el concepto Secure by Demand?\nEl concepto Secure by Demand combina los principios de Secure by Design con la planificación presupuestaria y los contratos de adquisición, con el fin de impulsar Secure by Design como un mandato tanto para proveedores como para contratistas. La [Guía Secure by Demand de CISA](https://www.cisa.gov/resources-tools/resources/secure-demand-guide) proporciona un conjunto de preguntas y recursos que los clientes de software y responsables de compras pueden utilizar para comprender mejor el enfoque de un proveedor potencial hacia la ciberseguridad. Incluye preguntas sobre las prácticas de autenticación del proveedor, la seguridad de la cadena de suministro de software y la divulgación y reporte de vulnerabilidades.\n\nAl exigir a los proveedores que se adhieran a los principios y protocolos de Secure by Design en sus productos y servicios, las organizaciones pueden ayudar a prevenir que vulnerabilidades potenciales ingresen a su cadena de suministro de software. El enfoque Secure by Demand también incentiva a los proveedores a mejorar continuamente su propia postura de ciberseguridad.\n\n## Desarrollar una estrategia de ciberseguridad que cumpla con los principios de Secure by Design\nA medida que las organizaciones priorizan la transición hacia un modelo Secure by Design, deben cumplir con determinados pasos que incluyen la implementación de prácticas efectivas de DevSecOps, el mantenimiento de una lista de materiales de software (SBOM) y la integración de IA para defenderse contra las amenazas que puedan surgir en cualquier etapa del ciclo de desarrollo de software.\n\n### Adoptar prácticas de DevSecOps\nUna de las primeras medidas para respaldar una postura Secure by Design es un proceso de desarrollo de software seguro: desarrollar, construir, proteger e implementar software utilizando un enfoque integral de DevSecOps.\n\nHoy en día, muchos desarrolladores utilizan herramientas complejas para crear nuevos programas. Según una [encuesta reciente de GitLab](https://about.gitlab.com/developer-survey/), el 62 % de los participantes utiliza 6 o más herramientas para el desarrollo de software, y un 20 % utiliza 11 o más. Esta situación genera ineficiencias que incrementan el riesgo al introducir posibles vulnerabilidades de seguridad.\n\nLos desarrolladores deberían poder acceder a todas las herramientas necesarias para los flujos de trabajo de DevSecOps en una interfaz única y fácil de usar. Con una solución de extremo a extremo, como una [plataforma de DevSecOps](/platform/), las organizaciones pueden implementar un enfoque Secure by Design sin aumentar la carga para los desarrolladores.\n\n### Crear y mantener SBOM\nAdoptar la transparencia es otro aspecto importante del concepto Secure by Design. Las organizaciones deben comprender qué contiene su software, especialmente cuando puede incluir componentes de múltiples fuentes.Las [SBOM son herramientas esenciales para lograr esta transparencia](https://about.gitlab.com/blog/the-ultimate-guide-to-sboms/). Proporcionan inventarios detallados de componentes de software, que incluye información sobre versiones, licencias y dependencias, lo que permite una mayor conciencia sobre posibles vulnerabilidades o código malicio. \n\nMantener este inventario permite a las organizaciones comprender plenamente las vulnerabilidades y riesgos potenciales que podrían surgir cuando se incorporan elementos de repositorios de código abierto y componentes de terceros con licencia. Una plataforma de DevSecOps puede ayudar a [generar y actualizar automáticamente SBOM](/solutions/security-compliance/), integrarlas en los flujos de trabajo existentes y vincularlas a las vulnerabilidades asociadas.\n\nSi bien muchas organizaciones ahora utilizan las SBOM, estas deben ser dinámicas, estar conectadas a herramientas de análisis de seguridad y actualizarse de manera constante para ser completamente efectivas. Cuando se integran con herramientas de análisis y con paneles de control, las SBOM pueden proporcionar una forma de identificar los riesgos asociados a una aplicación. Incluso cuando no son necesarias, las SBOM pueden respaldar el cumplimiento de las normas de seguridad al validar que el código sea seguro.\n\n### Uso de la IA en el desarrollo de software\nA medida que las organizaciones exploran formas de utilizar la IA, los flujos de trabajo de desarrollo de software proporcionan un punto de entrada valioso para esta tecnología, que tiene el potencial de acelerar los procesos de desarrollo y mejorar la seguridad.\n\nOrganizaciones de todos los sectores ya están comenzando a explorar estas aplicaciones: el 39 % de los participantes [de la encuesta de GitLab](https://about.gitlab.com/developer-survey/2024/ai/) afirmó que ya está utilizando la IA en el ciclo de desarrollo de software.\n\nAplicar la IA en todo el ciclo de desarrollo de software puede ayudar a las organizaciones a prevenir los silos y los retrasos basados en la IA dentro de los flujos de trabajo de desarrollo. La IA puede desempeñar funciones clave como:\n\n* Explicación del código y refactorización del código heredado a [lenguajes con memoria segura](https://about.gitlab.com/blog/memory-safe-vs-unsafe/).\n* [Análisis de causa raíz para pipelines de DevSecOps](https://about.gitlab.com/blog/developing-gitlab-duo-blending-ai-and-root-cause-analysis-to-fix-ci-cd/), que acelera la resolución de problemas complejos durante las fases de prueba.\n* [Resolución de vulnerabilidades](https://about.gitlab.com/es/the-source/ai/understand-and-resolve-vulnerabilities-with-ai-powered-gitlab-duo/) para ayudar a conciliar las vulnerabilidades conocidas, apoyando una corrección más exhaustiva\n\nAl integrar la inteligencia artificial en sus flujos de trabajo, es crucial que los líderes prioricen la privacidad y la seguridad de los datos. Un aspecto fundamental de la adopción de un enfoque Secure by Design es desarrollar una [estrategia de IA que proteja los datos confidenciales y los derechos de propiedad intelectual](https://about.gitlab.com/the-source/ai/building-a-transparency-first-ai-strategy-7-questions-to-ask-your-devops/).\n\n### Lo que sigue\nEs posible que el enfoque Secure by Design pronto se convierta en el predeterminado para crear un ecosistema de software más confiable. El [gobierno de Estados Unidos](https://about.gitlab.com/the-source/security/national-cybersecurity-strategy-a-wake-up-call-for-software-developers/) colabora actualmente con desarrolladores de software para establecer marcos que incentiven legalmente al sector privado a desarrollar y lanzar software Secure by Design, lo que impulsa a las empresas a realizar mayores inversiones en tecnologías y prácticas de seguridad.\n\nCon la seguridad integrada en el desarrollo de software desde el inicio, la transparencia lograda a través de SBOM efectivas, y la IA que optimiza el proceso de desarrollo, todos los involucrados en el ciclo de desarrollo de software estarán mejor posicionados para alcanzar el éxito.","article","strengthen-your-cybersecurity-strategy-with-secure-by-design","content:es:the-source:security:strengthen-your-cybersecurity-strategy-with-secure-by-design:index.yml","yaml","content","es/the-source/security/strengthen-your-cybersecurity-strategy-with-secure-by-design/index.yml","es/the-source/security/strengthen-your-cybersecurity-strategy-with-secure-by-design/index","yml",{"_path":37,"_dir":38,"_draft":6,"_partial":6,"_locale":7,"data":39,"_id":340,"_type":31,"title":341,"_source":32,"_file":342,"_stem":343,"_extension":35},"/shared/es/main-footer","es",{"text":40,"source":41,"edit":47,"contribute":52,"config":57,"items":62,"minimal":332},"Git es una marca registrada de Software Freedom Conservancy, y nuestro uso de «GitLab» está bajo licencia",{"text":42,"config":43},"Ver fuente de la página",{"href":44,"dataGaName":45,"dataGaLocation":46},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/","page source","footer",{"text":48,"config":49},"Editar esta página",{"href":50,"dataGaName":51,"dataGaLocation":46},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/content/","web ide",{"text":53,"config":54},"Contribuya",{"href":55,"dataGaName":56,"dataGaLocation":46},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/CONTRIBUTING.md/","please contribute",{"twitter":58,"facebook":59,"youtube":60,"linkedin":61},"https://twitter.com/gitlab","https://www.facebook.com/gitlab","https://www.youtube.com/channel/UCnMGQ8QHMAnVIsI3xJrihhg","https://www.linkedin.com/company/gitlab-com",[63,90,163,231,293],{"title":64,"links":65,"subMenu":71},"Plataforma",[66],{"text":67,"config":68},"Plataforma de DevSecOps",{"href":69,"dataGaName":70,"dataGaLocation":46},"/es/platform/","devsecops platform",[72],{"title":73,"links":74},"Precios",[75,80,85],{"text":76,"config":77},"Ver planes",{"href":78,"dataGaName":79,"dataGaLocation":46},"/es/pricing/","view plans",{"text":81,"config":82},"¿Por qué elegir GitLab Premium?",{"href":83,"dataGaName":84,"dataGaLocation":46},"/es/pricing/premium/","why premium",{"text":86,"config":87},"¿Por qué elegir GitLab Ultimate?",{"href":88,"dataGaName":89,"dataGaLocation":46},"/es/pricing/ultimate/","why ultimate",{"title":91,"links":92},"Soluciones",[93,98,103,108,113,118,123,128,133,138,143,148,153,158],{"text":94,"config":95},"Transformación digital",{"href":96,"dataGaName":97,"dataGaLocation":46},"/es/topics/digital-transformation/","digital transformation",{"text":99,"config":100},"Seguridad y cumplimiento",{"href":101,"dataGaName":102,"dataGaLocation":46},"/es/solutions/security-compliance/","security & compliance",{"text":104,"config":105},"Entrega de software automatizada",{"href":106,"dataGaName":107,"dataGaLocation":46},"/es/solutions/delivery-automation/","automated software delivery",{"text":109,"config":110},"Desarrollo ágil",{"href":111,"dataGaName":112,"dataGaLocation":46},"/es/solutions/agile-delivery/","agile delivery",{"text":114,"config":115},"Transformación en la nube",{"href":116,"dataGaName":117,"dataGaLocation":46},"/es/topics/cloud-native/","cloud transformation",{"text":119,"config":120},"Gestión del código fuente",{"href":121,"dataGaName":122,"dataGaLocation":46},"/es/solutions/source-code-management/","source code management",{"text":124,"config":125},"CI/CD",{"href":126,"dataGaName":127,"dataGaLocation":46},"/es/solutions/continuous-integration/","continuous integration & delivery",{"text":129,"config":130},"Gestión del flujo de valor",{"href":131,"dataGaName":132,"dataGaLocation":46},"/es/solutions/value-stream-management/","value stream management",{"text":134,"config":135},"GitOps",{"href":136,"dataGaName":137,"dataGaLocation":46},"/es/solutions/gitops/","gitops",{"text":139,"config":140},"Empresas",{"href":141,"dataGaName":142,"dataGaLocation":46},"/es/enterprise/","enterprise",{"text":144,"config":145},"Pequeñas empresas",{"href":146,"dataGaName":147,"dataGaLocation":46},"/es/small-business/","small business",{"text":149,"config":150},"Sector público",{"href":151,"dataGaName":152,"dataGaLocation":46},"/es/solutions/public-sector/","public sector",{"text":154,"config":155},"Educación",{"href":156,"dataGaName":157,"dataGaLocation":46},"/es/solutions/education/","education",{"text":159,"config":160},"Servicios financieros",{"href":161,"dataGaName":162,"dataGaLocation":46},"/es/solutions/finance/","financial services",{"title":164,"links":165},"Recursos",[166,171,176,181,186,191,196,201,206,211,216,221,226],{"text":167,"config":168},"Instalar",{"href":169,"dataGaName":170,"dataGaLocation":46},"/es/install/","install",{"text":172,"config":173},"Guías de inicio rápido",{"href":174,"dataGaName":175,"dataGaLocation":46},"/es/get-started/","quick setup checklists",{"text":177,"config":178},"Aprender",{"href":179,"dataGaName":180,"dataGaLocation":46},"https://university.gitlab.com/","learn",{"text":182,"config":183},"Documentación del producto",{"href":184,"dataGaName":185,"dataGaLocation":46},"https://docs.gitlab.com/","docs",{"text":187,"config":188},"Blog",{"href":189,"dataGaName":190,"dataGaLocation":46},"/blog/","blog",{"text":192,"config":193},"Historias de éxito del cliente",{"href":194,"dataGaName":195,"dataGaLocation":46},"/customers/","customer success stories",{"text":197,"config":198},"Remoto",{"href":199,"dataGaName":200,"dataGaLocation":46},"https://handbook.gitlab.com/handbook/company/culture/all-remote/","remote",{"text":202,"config":203},"Servicios de GitLab",{"href":204,"dataGaName":205,"dataGaLocation":46},"/es/services/","services",{"text":207,"config":208},"TeamOps",{"href":209,"dataGaName":210,"dataGaLocation":46},"/es/teamops/","teamops",{"text":212,"config":213},"Comunidad",{"href":214,"dataGaName":215,"dataGaLocation":46},"/community/","community",{"text":217,"config":218},"Foro",{"href":219,"dataGaName":220,"dataGaLocation":46},"https://forum.gitlab.com/","forum",{"text":222,"config":223},"Eventos",{"href":224,"dataGaName":225,"dataGaLocation":46},"/events/","events",{"text":227,"config":228},"Socios",{"href":229,"dataGaName":230,"dataGaLocation":46},"/es/partners/","partners",{"title":232,"links":233},"Empresa",[234,239,244,249,254,259,264,268,273,278,283,288],{"text":235,"config":236},"Acerca de nosotros",{"href":237,"dataGaName":238,"dataGaLocation":46},"/es/company/","company",{"text":240,"config":241},"Jobs",{"href":242,"dataGaName":243,"dataGaLocation":46},"/jobs/","jobs",{"text":245,"config":246},"Liderazgo",{"href":247,"dataGaName":248,"dataGaLocation":46},"/company/team/e-group/","leadership",{"text":250,"config":251},"Equipo",{"href":252,"dataGaName":253,"dataGaLocation":46},"/company/team/","team",{"text":255,"config":256},"Manual",{"href":257,"dataGaName":258,"dataGaLocation":46},"https://handbook.gitlab.com/","handbook",{"text":260,"config":261},"Relaciones con los inversores",{"href":262,"dataGaName":263,"dataGaLocation":46},"https://ir.gitlab.com/","investor relations",{"text":265,"config":266},"Sustainability",{"href":267,"dataGaName":265,"dataGaLocation":46},"/sustainability/",{"text":269,"config":270},"Diversidad, inclusión y pertenencia (DIB)",{"href":271,"dataGaName":272,"dataGaLocation":46},"/diversity-inclusion-belonging/","Diversity, inclusion and belonging",{"text":274,"config":275},"Centro de confianza",{"href":276,"dataGaName":277,"dataGaLocation":46},"/es/security/","trust center",{"text":279,"config":280},"Boletín",{"href":281,"dataGaName":282,"dataGaLocation":46},"/company/contact/","newsletter",{"text":284,"config":285},"Prensa",{"href":286,"dataGaName":287,"dataGaLocation":46},"/press/","press",{"text":289,"config":290},"Declaración de transparencia sobre la Ley de Esclavitud Moderna",{"href":291,"dataGaName":292,"dataGaLocation":46},"https://handbook.gitlab.com/handbook/legal/modern-slavery-act-transparency-statement/","modern slavery transparency statement",{"title":294,"links":295},"Comuníquese con nosotros",[296,301,306,311,316,321,326],{"text":297,"config":298},"Contactar con un experto",{"href":299,"dataGaName":300,"dataGaLocation":46},"/es/sales/","sales",{"text":302,"config":303},"Obtener ayuda",{"href":304,"dataGaName":305,"dataGaLocation":46},"/support/","get help",{"text":307,"config":308},"Portal de clientes",{"href":309,"dataGaName":310,"dataGaLocation":46},"https://customers.gitlab.com/customers/sign_in/","customer portal",{"text":312,"config":313},"Estado",{"href":314,"dataGaName":315,"dataGaLocation":46},"https://status.gitlab.com/","status",{"text":317,"config":318},"Términos de uso",{"href":319,"dataGaName":320,"dataGaLocation":46},"/terms/","terms of use",{"text":322,"config":323},"Declaración de privacidad",{"href":324,"dataGaName":325,"dataGaLocation":46},"/es/privacy/","privacy statement",{"text":327,"config":328},"Preferencias de cookies",{"dataGaName":329,"dataGaLocation":46,"id":330,"isOneTrustButton":331},"cookie preferences","ot-sdk-btn",true,{"items":333},[334,336,338],{"text":317,"config":335},{"href":319,"dataGaName":320,"dataGaLocation":46},{"text":322,"config":337},{"href":324,"dataGaName":325,"dataGaLocation":46},{"text":327,"config":339},{"dataGaName":329,"dataGaLocation":46,"id":330,"isOneTrustButton":331},"content:shared:es:main-footer.yml","Main Footer","shared/es/main-footer.yml","shared/es/main-footer",{"_path":345,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"logo":346,"subscribeLink":351,"navItems":355,"_id":367,"_type":31,"title":368,"_source":32,"_file":369,"_stem":370,"_extension":35},"/shared/es/the-source/navigation",{"altText":347,"config":348},"the source logo",{"src":349,"href":350},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1750191004/t7wz1klfb2kxkezksv9t.svg","/es/the-source/",{"text":352,"config":353},"Suscribirse",{"href":354},"#subscribe",[356,360,363],{"text":357,"config":358},"Inteligencia artificial",{"href":359},"/es/the-source/ai/",{"text":99,"config":361},{"href":362},"/es/the-source/security/",{"text":364,"config":365},"Plataforma e infraestructura",{"href":366},"/es/the-source/platform/","content:shared:es:the-source:navigation.yml","Navigation","shared/es/the-source/navigation.yml","shared/es/the-source/navigation",{"_path":372,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"title":373,"description":374,"submitMessage":375,"formData":376,"_id":380,"_type":31,"_source":32,"_file":381,"_stem":382,"_extension":35},"/shared/es/the-source/newsletter","Boletín The Source","Manténgase al día con información sobre el futuro del desarrollo de software.","Se ha suscrito correctamente al boletín The Source.",{"config":377},{"formId":378,"formName":379,"hideRequiredLabel":331},28470,"thesourcenewsletter","content:shared:es:the-source:newsletter.yml","shared/es/the-source/newsletter.yml","shared/es/the-source/newsletter",{"categoryNames":384},{"ai":357,"platform":364,"security":99},{"_path":386,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"config":387,"seo":388,"content":391,"type":405,"slug":406,"_id":407,"_type":31,"title":7,"_source":32,"_file":408,"_stem":409,"_extension":35},"/es/the-source/ai",{"layout":9},{"title":357,"description":389,"ogImage":7,"config":390},"Explore los insights de expertos sobre cómo la IA está transformando el desarrollo de software y cómo las organizaciones pueden aprovechar al máximo sus inversiones en IA.",{"ignoreDescriptionCharLimit":331},[392,398],{"componentName":393,"componentContent":394},"TheSourceCategoryHero",{"title":357,"description":389,"image":395},{"config":396},{"src":397},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463300/eoudcbj5aoucl0spsp0c.png",{"componentName":399,"componentContent":400},"TheSourceCategoryMainSection",{"config":401},{"gatedAssets":402},[403,404],"source-lp-how-to-get-started-using-ai-in-software-development","navigating-ai-maturity-in-devsecops","category","ai","content:es:the-source:ai:index.yml","es/the-source/ai/index.yml","es/the-source/ai/index",{"_path":411,"_dir":412,"_draft":6,"_partial":6,"_locale":7,"config":413,"title":416,"description":417,"link":418,"_id":424,"_type":31,"_source":32,"_file":425,"_stem":426,"_extension":35},"/shared/es/the-source/gated-assets/application-security-in-the-digital-age","gated-assets",{"id":414,"formId":415},"application-security-in-the-digital-age",1002,"Seguridad de las aplicaciones en la era digital","Lea los [resultados de la encuesta de más de 5000 profesionales de DevSecOps en todo el mundo](https://about.gitlab.com/developer-survey/2024/security-compliance/) para obtener información sobre cómo las organizaciones están lidiando con el aumento de las superficies de ataque y cambiando el comportamiento hacia la seguridad y la IA.",{"text":419,"config":420},"Leer el informe",{"href":421,"dataGaName":422,"dataGaLocation":423},"https://about.gitlab.com/developer-survey/2024/security-compliance","Application Security in the Digital Age","thesource","content:shared:es:the-source:gated-assets:application-security-in-the-digital-age.yml","shared/es/the-source/gated-assets/application-security-in-the-digital-age.yml","shared/es/the-source/gated-assets/application-security-in-the-digital-age",{"_path":386,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"config":428,"seo":429,"content":431,"type":405,"slug":406,"_id":407,"_type":31,"title":7,"_source":32,"_file":408,"_stem":409,"_extension":35},{"layout":9},{"title":357,"description":389,"ogImage":7,"config":430},{"ignoreDescriptionCharLimit":331},[432,436],{"componentName":393,"componentContent":433},{"title":357,"description":389,"image":434},{"config":435},{"src":397},{"componentName":399,"componentContent":437},{"config":438},{"gatedAssets":439},[403,404],[441,453],{"_path":442,"_dir":412,"_draft":6,"_partial":6,"_locale":7,"config":443,"title":444,"description":445,"link":446,"_id":450,"_type":31,"_source":32,"_file":451,"_stem":452,"_extension":35},"/shared/es/the-source/gated-assets/navigating-ai-maturity-in-devsecops",{"id":404,"formId":415},"La madurez de la IA en el enfoque de DevSecOps","Lea los [resultados de la encuesta de más de 5000 profesionales de DevSecOps en todo el mundo](https://about.gitlab.com/developer-survey/2024/ai/) para obtener información sobre cómo las organizaciones están incorporando la IA en el ciclo de desarrollo de software (disponible en inglés).",{"text":419,"config":447},{"href":448,"dataGaName":449,"dataGaLocation":423},"https://about.gitlab.com/developer-survey/2024/ai/","Navigating AI Maturity in DevSecOps","content:shared:es:the-source:gated-assets:navigating-ai-maturity-in-devsecops.yml","shared/es/the-source/gated-assets/navigating-ai-maturity-in-devsecops.yml","shared/es/the-source/gated-assets/navigating-ai-maturity-in-devsecops",{"_path":454,"_dir":412,"_draft":6,"_partial":6,"_locale":7,"config":455,"title":456,"description":457,"link":458,"_id":463,"_type":31,"_source":32,"_file":464,"_stem":465,"_extension":35},"/shared/es/the-source/gated-assets/source-lp-how-to-get-started-using-ai-in-software-development",{"id":403,"formId":415},"Cómo empezar a usar la IA en el desarrollo de software","Lea nuestro e-book (en inglés) para consultar información concreta que le ayudará a crear un marco estratégico de IA para desarrollar software seguro más rápidamente (disponible en inglés).",{"text":459,"config":460},"Leer el e-book",{"href":461,"dataGaName":462,"dataGaLocation":423},"https://about.gitlab.com/the-source/ai/getting-started-with-ai-in-software-development-a-guide-for-leaders/","How to Get Started Using AI in Software Development","content:shared:es:the-source:gated-assets:source-lp-how-to-get-started-using-ai-in-software-development.yml","shared/es/the-source/gated-assets/source-lp-how-to-get-started-using-ai-in-software-development.yml","shared/es/the-source/gated-assets/source-lp-how-to-get-started-using-ai-in-software-development",[467,490,506,522,538,559,579,595,613,633,650,671,687,705,722,740,759,777,796,816,837,853,869,887,905,924,940,958,974,993],{"_path":468,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":470,"seo":471,"content":473,"type":485,"slug":486,"_id":487,"_type":31,"title":472,"_source":32,"_file":488,"_stem":489,"_extension":35},"/es/the-source/authors/amanda-rueda","authors",{"layout":9},{"title":472},"Amanda Rueda",[474,483],{"componentName":475,"componentContent":476},"TheSourceAuthorHero",{"config":477,"name":472,"headshot":480},{"gitlabHandle":478,"linkedInProfileUrl":479},"amandarueda","https://www.linkedin.com/in/amandamrueda/",{"altText":472,"config":481},{"src":482},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463383/osecw1pzbxvb7fhqhiky.png",{"componentName":484},"TheSourceArticlesList","author","amanda-rueda","content:es:the-source:authors:amanda-rueda.yml","es/the-source/authors/amanda-rueda.yml","es/the-source/authors/amanda-rueda",{"_path":491,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":492,"seo":493,"content":495,"type":485,"slug":502,"_id":503,"_type":31,"title":494,"_source":32,"_file":504,"_stem":505,"_extension":35},"/es/the-source/authors/andre-michael-braun",{"layout":9},{"title":494},"Andre Michael Braun",[496,501],{"componentName":475,"componentContent":497},{"name":494,"headshot":498},{"altText":494,"config":499},{"src":500},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463336/yl27k7wdlnkzsizwknn1.jpg",{"componentName":484},"andre-michael-braun","content:es:the-source:authors:andre-michael-braun.yml","es/the-source/authors/andre-michael-braun.yml","es/the-source/authors/andre-michael-braun",{"_path":507,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":508,"seo":509,"content":511,"type":485,"slug":518,"_id":519,"_type":31,"title":510,"_source":32,"_file":520,"_stem":521,"_extension":35},"/es/the-source/authors/andrew-haschka",{"layout":9},{"title":510},"Andrew Haschka",[512,517],{"componentName":475,"componentContent":513},{"name":510,"headshot":514},{"altText":510,"config":515},{"src":516},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463349/z1qnc4uxmqgg3hnm3da4.png",{"componentName":484},"andrew-haschka","content:es:the-source:authors:andrew-haschka.yml","es/the-source/authors/andrew-haschka.yml","es/the-source/authors/andrew-haschka",{"_path":523,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":524,"seo":525,"content":527,"type":485,"slug":534,"_id":535,"_type":31,"title":526,"_source":32,"_file":536,"_stem":537,"_extension":35},"/es/the-source/authors/ayoub-fandi",{"layout":9},{"title":526},"Ayoub Fandi",[528,533],{"componentName":475,"componentContent":529},{"name":526,"headshot":530},{"altText":526,"config":531},{"src":532},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463329/wyp554loeyoibx3ozren.jpg",{"componentName":484},"ayoub-fandi","content:es:the-source:authors:ayoub-fandi.yml","es/the-source/authors/ayoub-fandi.yml","es/the-source/authors/ayoub-fandi",{"_path":539,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":540,"seo":541,"content":543,"type":485,"slug":555,"_id":556,"_type":31,"title":542,"_source":32,"_file":557,"_stem":558,"_extension":35},"/es/the-source/authors/brian-wald",{"layout":9},{"title":542},"Brian Wald",[544,554],{"componentName":475,"componentContent":545},{"config":546,"name":542,"role":549,"bio":550,"headshot":551},{"gitlabHandle":547,"linkedInProfileUrl":548},"brianwald","https://www.linkedin.com/in/brianwald/","Jefe de la Organización Global de CTO de Campo","Brian Wald es el jefe de la organización global de CTO de campo en GitLab. Lidera un equipo dinámico de CTO de campo dedicado a transformar las prácticas de desarrollo de software empresarial.",{"altText":542,"config":552},{"src":553},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463417/fugpbux9miqbdx3wewtu.jpg",{"componentName":484},"brian-wald","content:es:the-source:authors:brian-wald.yml","es/the-source/authors/brian-wald.yml","es/the-source/authors/brian-wald",{"_path":560,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":561,"seo":562,"content":564,"type":485,"slug":575,"_id":576,"_type":31,"title":563,"_source":32,"_file":577,"_stem":578,"_extension":35},"/es/the-source/authors/bryan-ross",{"layout":9},{"title":563},"Bryan Ross",[565,574],{"componentName":475,"componentContent":566},{"config":567,"name":563,"headshot":571},{"gitlabHandle":568,"twitterXProfileUrl":569,"linkedInProfileUrl":570},"bryanrossuk","https://twitter.com/bryanrossuk","https://www.linkedin.com/in/bryanross",{"altText":563,"config":572},{"src":573},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463324/mvdyvskii4hltdrgqxom.jpg",{"componentName":484},"bryan-ross","content:es:the-source:authors:bryan-ross.yml","es/the-source/authors/bryan-ross.yml","es/the-source/authors/bryan-ross",{"_path":580,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":581,"seo":582,"content":584,"type":485,"slug":591,"_id":592,"_type":31,"title":583,"_source":32,"_file":593,"_stem":594,"_extension":35},"/es/the-source/authors/chandler-gibbons",{"layout":9},{"title":583},"Chandler Gibbons",[585,590],{"componentName":475,"componentContent":586},{"name":583,"headshot":587},{"altText":583,"config":588},{"src":589},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463362/o7g9fqtqtjvegfwniuxh.jpg",{"componentName":484},"chandler-gibbons","content:es:the-source:authors:chandler-gibbons.yml","es/the-source/authors/chandler-gibbons.yml","es/the-source/authors/chandler-gibbons",{"_path":596,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":597,"seo":598,"content":600,"type":485,"slug":609,"_id":610,"_type":31,"title":599,"_source":32,"_file":611,"_stem":612,"_extension":35},"/es/the-source/authors/dave-steer",{"layout":9},{"title":599},"Dave Steer",[601,608],{"componentName":475,"componentContent":602},{"config":603,"name":599,"headshot":605},{"gitlabHandle":604},"dsteer",{"altText":599,"config":606},{"src":607},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463457/zbtapdkglu3yb9suaq7w.png",{"componentName":484},"dave-steer","content:es:the-source:authors:dave-steer.yml","es/the-source/authors/dave-steer.yml","es/the-source/authors/dave-steer",{"_path":614,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":615,"seo":616,"content":618,"type":485,"slug":628,"_id":629,"_type":31,"title":630,"_source":32,"_file":631,"_stem":632,"_extension":35},"/es/the-source/authors/ddesanto",{"layout":9},{"title":617},"David DeSanto",[619,627],{"componentName":475,"componentContent":620},{"config":621,"name":617,"headshot":624},{"gitlabHandle":622,"linkedInProfileUrl":623},"david","https://www.linkedin.com/in/ddesanto/",{"altText":617,"config":625},{"src":626},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463446/bgnljs84zcsxj0t6nvix.png",{"componentName":484},"ddesanto","content:es:the-source:authors:ddesanto.yml","Ddesanto","es/the-source/authors/ddesanto.yml","es/the-source/authors/ddesanto",{"_path":634,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":635,"seo":636,"content":638,"type":485,"slug":645,"_id":646,"_type":31,"title":647,"_source":32,"_file":648,"_stem":649,"_extension":35},"/es/the-source/authors/derek-debellis",{"layout":9},{"title":637},"Derek DeBellis",[639,644],{"componentName":475,"componentContent":640},{"name":637,"headshot":641},{"altText":637,"config":642},{"src":643},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463385/sbnjwfaguszi5g2smzr7.png",{"componentName":484},"derek-debellis","content:es:the-source:authors:derek-debellis.yml","Derek Debellis","es/the-source/authors/derek-debellis.yml","es/the-source/authors/derek-debellis",{"_path":651,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":652,"seo":653,"content":655,"type":485,"slug":667,"_id":668,"_type":31,"title":654,"_source":32,"_file":669,"_stem":670,"_extension":35},"/es/the-source/authors/emilio-salvador",{"layout":9},{"title":654},"Emilio Salvador",[656,666],{"componentName":475,"componentContent":657},{"config":658,"name":654,"role":661,"bio":662,"headshot":663},{"gitlabHandle":659,"linkedInProfileUrl":660},"esalvadorp","https://www.linkedin.com/in/emiliosp/","Vicepresidente de Estrategia y Relaciones con Desarrolladores","Emilio Salvador es vicepresidente de estrategia y relaciones con desarrolladores en GitLab. Ejecutivo en tecnología con más de 20 años de experiencia, Emilio ha desempeñado cargos en Amazon y Microsoft, y recientemente dirigió la estrategia y las operaciones del equipo de promoción y experiencia de desarrolladores de Google. Tiene una maestría (MBA) de la MIT Sloan School of Management.",{"altText":654,"config":664},{"src":665},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463402/g0snp3uisjm4tj3pkqcw.jpg",{"componentName":484},"emilio-salvador","content:es:the-source:authors:emilio-salvador.yml","es/the-source/authors/emilio-salvador.yml","es/the-source/authors/emilio-salvador",{"_path":672,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":673,"seo":674,"content":676,"type":485,"slug":683,"_id":684,"_type":31,"title":675,"_source":32,"_file":685,"_stem":686,"_extension":35},"/es/the-source/authors/erika-feldman",{"layout":9},{"title":675},"Erika Feldman",[677,682],{"componentName":475,"componentContent":678},{"name":675,"headshot":679},{"altText":675,"config":680},{"src":681},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463354/d9quqvz7d2ayjwif7vdn.png",{"componentName":484},"erika-feldman","content:es:the-source:authors:erika-feldman.yml","es/the-source/authors/erika-feldman.yml","es/the-source/authors/erika-feldman",{"_path":688,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":689,"seo":690,"content":692,"type":485,"slug":701,"_id":702,"_type":31,"title":691,"_source":32,"_file":703,"_stem":704,"_extension":35},"/es/the-source/authors/george-kichukov",{"layout":9},{"title":691},"George Kichukov",[693,700],{"componentName":475,"componentContent":694},{"config":695,"name":691,"headshot":697},{"gitlabHandle":696},"gkichukov",{"altText":691,"config":698},{"src":699},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463366/dk2knfancgsxocjkmyoa.jpg",{"componentName":484},"george-kichukov","content:es:the-source:authors:george-kichukov.yml","es/the-source/authors/george-kichukov.yml","es/the-source/authors/george-kichukov",{"_path":706,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":707,"seo":708,"content":710,"type":485,"slug":717,"_id":718,"_type":31,"title":719,"_source":32,"_file":720,"_stem":721,"_extension":35},"/es/the-source/authors/gitlab",{"layout":9},{"title":709},"GitLab",[711,716],{"componentName":475,"componentContent":712},{"name":709,"headshot":713},{"altText":709,"config":714},{"src":715},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463461/ts7io0hgpdyqylbzfire.png",{"componentName":484},"gitlab","content:es:the-source:authors:gitlab.yml","Gitlab","es/the-source/authors/gitlab.yml","es/the-source/authors/gitlab",{"_path":723,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":724,"seo":725,"content":727,"type":485,"slug":736,"_id":737,"_type":31,"title":726,"_source":32,"_file":738,"_stem":739,"_extension":35},"/es/the-source/authors/grant-hickman",{"layout":9},{"title":726},"Grant Hickman",[728,735],{"componentName":475,"componentContent":729},{"config":730,"name":726,"headshot":732},{"gitlabHandle":731},"g.hickman",{"altText":726,"config":733},{"src":734},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463463/f3uqwtugqotyhwutz5gu.png",{"componentName":484},"grant-hickman","content:es:the-source:authors:grant-hickman.yml","es/the-source/authors/grant-hickman.yml","es/the-source/authors/grant-hickman",{"_path":741,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":742,"seo":743,"content":745,"type":485,"slug":755,"_id":756,"_type":31,"title":744,"_source":32,"_file":757,"_stem":758,"_extension":35},"/es/the-source/authors/haim-snir",{"layout":9},{"title":744},"Haim Snir",[746,754],{"componentName":475,"componentContent":747},{"config":748,"name":744,"headshot":751},{"gitlabHandle":749,"linkedInProfileUrl":750},"hsnir1","https://www.linkedin.com/in/haimsnir/",{"altText":744,"config":752},{"src":753},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463395/nubmshvaq8wpomopllni.png",{"componentName":484},"haim-snir","content:es:the-source:authors:haim-snir.yml","es/the-source/authors/haim-snir.yml","es/the-source/authors/haim-snir",{"_path":760,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":761,"seo":762,"content":764,"type":485,"slug":768,"_id":773,"_type":31,"title":774,"_source":32,"_file":775,"_stem":776,"_extension":35},"/es/the-source/authors/iganbaruch",{"layout":9},{"title":763},"Itzik Gan Baruch",[765,772],{"componentName":475,"componentContent":766},{"config":767,"name":763,"headshot":769},{"gitlabHandle":768},"iganbaruch",{"altText":763,"config":770},{"src":771},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463443/vibb2fkc0ojni2d1eqde.png",{"componentName":484},"content:es:the-source:authors:iganbaruch.yml","Iganbaruch","es/the-source/authors/iganbaruch.yml","es/the-source/authors/iganbaruch",{"_path":778,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":779,"seo":780,"content":782,"type":485,"slug":791,"_id":792,"_type":31,"title":793,"_source":32,"_file":794,"_stem":795,"_extension":35},"/es/the-source/authors/jlongo",{"layout":9},{"title":781},"Joseph Longo",[783,790],{"componentName":475,"componentContent":784},{"config":785,"name":781,"headshot":787},{"gitlabHandle":786},"jlongo_gitlab",{"altText":781,"config":788},{"src":789},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463434/uoxaknpmoposbbgzqji8.png",{"componentName":484},"jlongo","content:es:the-source:authors:jlongo.yml","Jlongo","es/the-source/authors/jlongo.yml","es/the-source/authors/jlongo",{"_path":797,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":798,"seo":799,"content":801,"type":485,"slug":12,"_id":813,"_type":31,"title":800,"_source":32,"_file":814,"_stem":815,"_extension":35},"/es/the-source/authors/joel-krooswyk",{"layout":9},{"title":800},"Joel Krooswyk",[802,812],{"componentName":475,"componentContent":803},{"config":804,"name":800,"role":807,"bio":808,"headshot":809},{"gitlabHandle":805,"linkedInProfileUrl":806},"jkrooswyk","https://www.linkedin.com/in/joelrkrooswyk/","Director de tecnología federal","Joel Krooswyk es el director de Tecnología federal en GitLab. Ha participado activamente en el crecimiento de GitLab desde 2017. Sus 25 años de experiencia en liderazgo abarcan no solo el sector público de Estados Unidos, sino también pequeñas, medianas y grandes empresas a nivel mundial. Joel combina una profunda experiencia en políticas gubernamentales con un amplio conocimiento en tecnología, desarrollo de software, inteligencia artificial y ciberseguridad. La industria y las agencias a menudo le piden sus comentarios y respuestas sobre políticas.",{"altText":800,"config":810},{"src":811},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463423/mkmdhuxsjggfvokdmdv7.jpg",{"componentName":484},"content:es:the-source:authors:joel-krooswyk.yml","es/the-source/authors/joel-krooswyk.yml","es/the-source/authors/joel-krooswyk",{"_path":817,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":818,"seo":819,"content":821,"type":485,"slug":833,"_id":834,"_type":31,"title":820,"_source":32,"_file":835,"_stem":836,"_extension":35},"/es/the-source/authors/josh-lemos",{"layout":9},{"title":820},"Josh Lemos",[822,832],{"componentName":475,"componentContent":823},{"config":824,"name":820,"role":827,"bio":828,"headshot":829},{"gitlabHandle":825,"linkedInProfileUrl":826},"joshlemos","https://www.linkedin.com/in/joshlemos/","Director de Seguridad de la Información","Josh Lemos es director de Seguridad de la Información en GitLab Inc. Sus 20 años de experiencia dirigiendo equipos de seguridad de la información lo convierten una parte fundamental del equipo. Su responsabilidad incluye definir y mantener la visión, la estrategia y el programa de la empresa para garantizar la protección de los activos y las tecnologías de la información, fortalecer la plataforma de DevSecOps de GitLab y garantizar el máximo nivel de seguridad para los clientes.",{"altText":820,"config":830},{"src":831},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463405/f4rqtiecakrekvxfhqar.jpg",{"componentName":484},"josh-lemos","content:es:the-source:authors:josh-lemos.yml","es/the-source/authors/josh-lemos.yml","es/the-source/authors/josh-lemos",{"_path":838,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":839,"seo":840,"content":842,"type":485,"slug":849,"_id":850,"_type":31,"title":841,"_source":32,"_file":851,"_stem":852,"_extension":35},"/es/the-source/authors/julie-griffin",{"layout":9},{"title":841},"Julie Griffin",[843,848],{"componentName":475,"componentContent":844},{"name":841,"headshot":845},{"altText":841,"config":846},{"src":847},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463371/hqkbr3uk8hw2de7tltn4.webp",{"componentName":484},"julie-griffin","content:es:the-source:authors:julie-griffin.yml","es/the-source/authors/julie-griffin.yml","es/the-source/authors/julie-griffin",{"_path":854,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":855,"seo":856,"content":858,"type":485,"slug":865,"_id":866,"_type":31,"title":857,"_source":32,"_file":867,"_stem":868,"_extension":35},"/es/the-source/authors/kristina-weis",{"layout":9},{"title":857},"Kristina Weis",[859,864],{"componentName":475,"componentContent":860},{"name":857,"headshot":861},{"altText":857,"config":862},{"src":863},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463469/eoolq6n6bs0zb8gmf0js.webp",{"componentName":484},"kristina-weis","content:es:the-source:authors:kristina-weis.yml","es/the-source/authors/kristina-weis.yml","es/the-source/authors/kristina-weis",{"_path":870,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":871,"seo":872,"content":874,"type":485,"slug":883,"_id":884,"_type":31,"title":873,"_source":32,"_file":885,"_stem":886,"_extension":35},"/es/the-source/authors/lee-faus",{"layout":9},{"title":873},"Lee Faus",[875,882],{"componentName":475,"componentContent":876},{"config":877,"name":873,"headshot":879},{"gitlabHandle":878},"lfaus",{"altText":873,"config":880},{"src":881},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463398/vivhlomglvnstamj54bo.jpg",{"componentName":484},"lee-faus","content:es:the-source:authors:lee-faus.yml","es/the-source/authors/lee-faus.yml","es/the-source/authors/lee-faus",{"_path":888,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":889,"seo":890,"content":892,"type":485,"slug":896,"_id":901,"_type":31,"title":902,"_source":32,"_file":903,"_stem":904,"_extension":35},"/es/the-source/authors/ncregan",{"layout":9},{"title":891},"Niall Cregan",[893,900],{"componentName":475,"componentContent":894},{"config":895,"name":891,"headshot":897},{"gitlabHandle":896},"ncregan",{"altText":891,"config":898},{"src":899},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463431/yrtwodocb4cu3j7lkhyo.png",{"componentName":484},"content:es:the-source:authors:ncregan.yml","Ncregan","es/the-source/authors/ncregan.yml","es/the-source/authors/ncregan",{"_path":906,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":907,"seo":908,"content":910,"type":485,"slug":919,"_id":920,"_type":31,"title":921,"_source":32,"_file":922,"_stem":923,"_extension":35},"/es/the-source/authors/rschulman",{"layout":9},{"title":909},"Robin Schulman",[911,918],{"componentName":475,"componentContent":912},{"config":913,"name":909,"headshot":915},{"gitlabHandle":914},"robin",{"altText":909,"config":916},{"src":917},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463437/u2xfbudw1f8hhnkrgaoy.webp",{"componentName":484},"rschulman","content:es:the-source:authors:rschulman.yml","Rschulman","es/the-source/authors/rschulman.yml","es/the-source/authors/rschulman",{"_path":925,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":926,"seo":927,"content":929,"type":485,"slug":936,"_id":937,"_type":31,"title":928,"_source":32,"_file":938,"_stem":939,"_extension":35},"/es/the-source/authors/sabrina-farmer",{"layout":9},{"title":928},"Sabrina Farmer",[930,935],{"componentName":475,"componentContent":931},{"name":928,"headshot":932},{"altText":928,"config":933},{"src":934},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463377/udmzbjjr5xrcrffdlphx.webp",{"componentName":484},"sabrina-farmer","content:es:the-source:authors:sabrina-farmer.yml","es/the-source/authors/sabrina-farmer.yml","es/the-source/authors/sabrina-farmer",{"_path":941,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":942,"seo":943,"content":945,"type":485,"slug":954,"_id":955,"_type":31,"title":944,"_source":32,"_file":956,"_stem":957,"_extension":35},"/es/the-source/authors/sandra-gittlen",{"layout":9},{"title":944},"Sandra Gittlen",[946,953],{"componentName":475,"componentContent":947},{"config":948,"name":944,"headshot":950},{"gitlabHandle":949},"sgittlen",{"altText":944,"config":951},{"src":952},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463466/r7ckb9h2zr4c2rsz3zlm.png",{"componentName":484},"sandra-gittlen","content:es:the-source:authors:sandra-gittlen.yml","es/the-source/authors/sandra-gittlen.yml","es/the-source/authors/sandra-gittlen",{"_path":959,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":960,"seo":961,"content":963,"type":485,"slug":970,"_id":971,"_type":31,"title":962,"_source":32,"_file":972,"_stem":973,"_extension":35},"/es/the-source/authors/sharon-gaudin",{"layout":9},{"title":962},"Sharon Gaudin",[964,969],{"componentName":475,"componentContent":965},{"name":962,"headshot":966},{"altText":962,"config":967},{"src":968},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463475/h6j4nnvykzyfzgvl7txb.webp",{"componentName":484},"sharon-gaudin","content:es:the-source:authors:sharon-gaudin.yml","es/the-source/authors/sharon-gaudin.yml","es/the-source/authors/sharon-gaudin",{"_path":975,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":976,"seo":977,"content":979,"type":485,"slug":989,"_id":990,"_type":31,"title":978,"_source":32,"_file":991,"_stem":992,"_extension":35},"/es/the-source/authors/stephen-walters",{"layout":9},{"title":978},"Stephen Walters",[980,988],{"componentName":475,"componentContent":981},{"config":982,"name":978,"headshot":985},{"gitlabHandle":983,"linkedInProfileUrl":984},"swalters1","https://www.linkedin.com/in/1stephenwalters/",{"altText":978,"config":986},{"src":987},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463392/g6ktk5qb4vcqc9wqjlf9.jpg",{"componentName":484},"stephen-walters","content:es:the-source:authors:stephen-walters.yml","es/the-source/authors/stephen-walters.yml","es/the-source/authors/stephen-walters",{"_path":994,"_dir":469,"_draft":6,"_partial":6,"_locale":7,"config":995,"seo":996,"content":998,"type":485,"slug":1010,"_id":1011,"_type":31,"title":1012,"_source":32,"_file":1013,"_stem":1014,"_extension":35},"/es/the-source/authors/taylor-mccaslin",{"layout":9},{"title":997},"Taylor McCaslin",[999,1009],{"componentName":475,"componentContent":1000},{"config":1001,"name":997,"role":1004,"bio":1005,"headshot":1006},{"gitlabHandle":1002,"linkedInProfileUrl":1003},"tmccaslin","https://www.linkedin.com/in/taylormccaslin/","Gerente de Grupo, Producto, Ciencia de Datos","Taylor McCaslin es el líder de producto para IA/ML en GitLab, donde dirige el equipo de gerentes de producto que gestionan los grupos de etapas con tecnología de IA y de ModelOps. Además, se encarga de establecer la visión y la dirección de cómo permitir que los usuarios de GitLab aprovechen la ciencia de datos como parte de su programa de DevOps. Antes de unirse a GitLab, ocupó cargos en Indeed, Duo Security y WP Engine.",{"altText":997,"config":1007},{"src":1008},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463427/trfasilaeasosxfcxmsm.jpg",{"componentName":484},"taylor-mccaslin","content:es:the-source:authors:taylor-mccaslin.yml","Taylor Mccaslin","es/the-source/authors/taylor-mccaslin.yml","es/the-source/authors/taylor-mccaslin",1753981677882]