[{"data":1,"prerenderedAt":1013},["ShallowReactive",2],{"/de-de/the-source/security/security-its-more-than-culture-addressing-the-root-cause-of-common-security/":3,"footer-de-de":36,"the-source-navigation-de-de":343,"the-source-newsletter-de-de":370,"security-its-more-than-culture-addressing-the-root-cause-of-common-security-article-hero-category-de-de":382,"security-its-more-than-culture-addressing-the-root-cause-of-common-security-the-source-gated-asset-de-de":406,"security-its-more-than-culture-addressing-the-root-cause-of-common-security-category-de-de":422,"security-its-more-than-culture-addressing-the-root-cause-of-common-security-the-source-resources-de-de":435,"security-its-more-than-culture-addressing-the-root-cause-of-common-security-article-hero-author-de-de":464},{"_path":4,"_dir":5,"_draft":6,"_partial":6,"_locale":7,"config":8,"seo":15,"content":19,"type":28,"category":5,"slug":29,"_id":30,"_type":31,"title":7,"_source":32,"_file":33,"_stem":34,"_extension":35},"/de-de/the-source/security/security-its-more-than-culture-addressing-the-root-cause-of-common-security","security",false,"",{"layout":9,"template":10,"articleType":11,"author":12,"featured":13,"gatedAsset":14},"the-source","TheSourceArticle","Regular","josh-lemos",true,"application-security-in-the-digital-age",{"title":16,"description":17,"ogImage":18},"Grundursachen für Frustration im Sicherheitsbereich","Was steht hinter den häufigsten Frustrationen im Sicherheitsbereich? Das sehen wir uns in diesem Artikel genauer an.","https://res.cloudinary.com/about-gitlab-com/image/upload/v1751464489/mragusmxl1wz8ozdaoml.png",{"title":20,"date":21,"description":17,"timeToRead":22,"heroImage":18,"keyTakeaways":23,"articleBody":27},"Frustrationen im Sicherheitsbereich – die häufigsten Ursachen","2024-10-29","Lesedauer: 5 Min.",[24,25,26],"Der Umstieg auf authentifiziertes Scannen im Schwachstellenmanagement verbessert zwar die Wirksamkeit, aber dadurch arbeiten Engineers ggf. an nicht kritischen Aufgaben, wodurch ein Konflikt zwischen den Sicherheits- und Engineering-Teams entstehen kann.","Ein minimalistischer Ansatz bei der Softwareentwicklung kann Abhängigkeiten auf ein Minimum reduzieren, das Scanner-Rauschen reduzieren und die Belastung der Entwickler(innen) verringern, um so zu verbesserter Software-Sicherheit beizutragen.","Mit einem Ansatz, der auf sogenannte „Paved Roads“, also bereits getestete und abgesicherte Entwurfsmuster mit wiederholbaren Anwendungsfällen basiert, kann die Last der Engineering-Teams verringert und die Sicherheit verbessert werden.","In der [jährlichen Umfrage von GitLab unter DevSecOps-Expert(inn)en](https://about.gitlab.com/de-de/developer-survey/) wurden zahlreiche Themen aufgedeckt, die sich auf eine Organisationskultur beziehen, die eine tiefere Abstimmung zwischen Engineering- und Sicherheitsteams verhindern könnte. Die Mehrheit (58 %) der Befragten im Sicherheitsbereich gab an, dass es für sie schwierig ist, Entwickler dazu zu bringen, das Beheben von Sicherheitslücken zu priorisieren. 52 % sagten, dass übermäßige Bürokratisierung die rasche Behebung von Sicherheitslücken behindere. Außerdem nannten die Befragten im Sicherheitsbereich einige spezifische Frustrationspunkte in ihrer Arbeit, darunter die Schwierigkeit, Sicherheitsergebnisse zu verstehen, zu viele falsch positive Ergebnisse und Tests, die erst spät im Softwareentwicklungsprozess stattfinden.\n\n[DevSecOps](/topics/devsecops/) verspricht eine bessere Integration zwischen Engineering und Sicherheit, aber es ist klar, dass Frustrationen und Fehlausrichtungen bestehen bleiben. Diese Herausforderungen sind nämlich Symptome eines größeren Problems, wie Unternehmen Sicherheit sehen und wie Teams zusammenarbeiten und ihre Zeit für Sicherheit aufwenden.\n\n## Entkomme dem Sicherheitslücken-Hamsterrad\n\nDas Scannen von Sicherheitslücken zeigt alle potenziellen Sicherheitslücken auf – aber nur weil ein Softwarepaket eine häufige Sicherheitslücke oder Gefährdung (CVE; Common Vulnerability or Exposure) aufweist, bedeutet das nicht, dass diese zugänglich oder ausnutzbar ist. Sowohl Sicherheitsteams als auch Entwickler(innen) priorisieren und filtern Sicherheitslücken, die exponentiell im Laufe der Jahre angewachsen sind, seit authentifizierte Sicherheitsscans zur Norm wurden.\n\nDer Umstieg auf authentifizierte Scans hat die Wirksamkeit von Sicherheitsprogrammen in vielerlei Hinsicht verbessert, hat jedoch die Entwickler(innen) in eine endloses Hamsterrad getrieben, in dem sie Dinge beheben müssen, die nicht wichtig sind. Wenn Teams ihre Bemühungen auf Patches verschwenden, die nicht ausnutzbare Sicherheitslücken beheben, werden sie von wichtigeren Aufgaben abgehalten, wie etwa von Patches für gefährliche und ausnutzbare Schwachstellen. Das ist die Hauptursache für die heutige Trennung zwischen Sicherheits- und Engineering-Teams.\n\nWie können Unternehmen also die Grundursachen dieser Probleme angehen und eine bessere Integration zwischen Engineering und Sicherheit fördern? Hier sind drei Möglichkeiten, um häufige Frustrationspunkte hinsichtlich der Sicherheit schon von Grund auf zu verhindern.\n\n### 1. Schalte das Rauschen aus und konzentriere dich auf umsetzbare, deutliche Signale\n\nÜbermäßige falsch positive Ergebnisse sind der am zweithäufigsten genannte Frustrationspunkt, den die Befragten im Sicherheitsbereich in unserer Umfrage angaben. Falsch positive Ergebnisse sind natürlich eine Herausforderung, sie sind aber oft auch ein verstecktes Problem im Sicherheitslückenmanagement.Wenn ein Unternehmen viele falsch positive Ergebnisse hat, kann dies ein Anzeichen dafür sein, dass vielleicht nicht alles Mögliche getan wurde, um sicherzustellen, dass die Sicherheitsergebnisse auch wirklich deutlich sind. Unternehmen sollten den Fokus ihrer Sicherheitsbemühungen auf das Wesentliche beschränken. Das bedeutet, dass herkömmliche Lösungen für statische Anwendungssicherheitstests (SAST) wahrscheinlich nicht ausreichen. SAST ist ein leistungsstarkes Tool, das jedoch viel seines Wertes verliert, wenn die Ergebnisse nicht genutzt werden können oder der entsprechende Kontext fehlt. Damit SAST so effektiv wie möglich ist, muss es [nahtlos mit anderen Sicherheits- und Entwicklungstools zusammen eingesetzt werden und den Entwickler(inne)n zugänglich sein](https://about.gitlab.com/blog/oxeye-joins-gitlab-to-advance-application-security-capabilities/).Ein weiteres Problem ist, dass die meisten Scan-Tools ein sehr enges Kontextfenster haben, um die Sicherheitslücken zu verstehen. Dies ist einer der Bereiche, in denen KI mit [KI-basierten Funktionen, die Sicherheitslücken erklären](https://about.gitlab.com/blog/understand-and-resolve-vulnerabilities-with-ai-powered-gitlab-duo/), helfen kann.\n\n### 2. Minimiere den Tech-Stack und damit die Angriffsfläche\n\nNicht nur bei Sicherheitstests gilt, sich auf das Wesentliche zu konzentrieren – das sollte damit beginnen, wie ein Unternehmen überhaupt Software erstellt.\n\nObwohl KI verspricht, die Softwareentwicklungsprozesse zu vereinfachen, [deutet unsere Umfrage darauf hin, dass viele Unternehmen noch einen langen Weg vor sich haben](https://about.gitlab.com/blog/3-surprising-findings-from-our-2024-global-devsecops-survey/). Tatsächlich wollten jene Befragten, die KI nutzen, ihre Toolchain deutlich wahrscheinlicher konsolidieren als jene, die keine KI nutzen. Das lässt darauf schließen, dass der Anstieg an verschiedensten Problempunkten durch unterschiedliche KI-Modelle die Komplexität erhöht, anstatt sie zu verringern.\n\nDie ständig zunehmende Komplexität der Tech-Stacks von Unternehmen trägt wesentlich zu Frustrationen im Bereich der Sicherheit bei. Eine gewisse Komplexität ist beim Aufbau großer, facettenreicher Softwaresysteme unvermeidlich. Unternehmen sollten jedoch Maßnahmen ergreifen, um Komplexität zu vermeiden, die sich aus suboptimalen Designentscheidungen ergibt, wie z. B. schwer zu wartender Code und redundante Abhängigkeiten. Diese unnötige Komplexität schafft eine größere Angriffsfläche und generiert mehr Sicherheitsscan-Ergebnisse, die Teams durchsuchen, priorisieren und bearbeiten müssen.\n\nUnternehmen sollten bei der Softwareentwicklung den Grundsatz der Softwareminimierung walten lassen, also sich bewusst sein, welche Tools sie einsetzen und was sie in ihre Codebase integrieren möchten. Das trägt dazu bei, Abhängigkeiten zu minimieren, die Sicherheit der Software-Lieferkette zu verbessern, Scanner-Rauschen zu reduzieren und die Belastung der Entwickler(innen) zu reduzieren, wenn es darum geht, nicht kritische Probleme zu beheben.\n\n### 3. Normalisiere die sogenannten „Paved Roads“\n\nSicherheitstests, die zu spät im Lebenszyklus der Softwareentwicklung stattfinden, waren ein weiterer der größten Frustrationspunkte, die unsere Umfrageteilnehmer(innen) erleben. Teams sind vielleicht frustriert, wenn sie etwas veröffentlichen wollen und sich das verzögert, weil eine Sicherheitslücke zu spät erkannt wird. In vielen Fällen wäre es jedoch gar nicht möglich gewesen, diese Sicherheitslücke früher zu finden. Es wäre jedoch möglich, einfach bereitstellbare, wiederverwendbare Sicherheitskomponenten zu nutzen und die Variablen und möglichen Sicherheitslücken dadurch einzugrenzen.Teams können Überraschungen in der späten Phase vermeiden, indem sie [getestete und abgesicherte Entwurfsmuster basierend auf wiederholbaren Anwendungsfällen](https://about.gitlab.com/the-source/platform/how-devops-and-platform-engineering-turbocharge-efficiency/) nutzen: den Ansatz der sogenannten „gepflasterten Straßen“ (Paved Roads). Eine gepflasterte Straße ist ein empfohlener Pfad, der eine kuratierte Auswahl an Tools, Prozessen und Komponenten enthält. Dieser Straße können Teams folgen, um sichere Anwendungen effizienter zu erstellen, z. B. indem sie GitOps nutzen, um gut konstruierte und getestete Infrastructure as Code zu versionieren und bereitzustellen, die sich für alle Workloads skalieren lässt.\n\nDurch solche gepflasterten Straßen geht zwar etwas Flexibilität verloren, doch der betriebliche Aufwand und Überarbeitungen für Engineering-Teams werden reduziert und die Sicherheit wird verbessert. Das muss eine gemeinsame Anstrengung zwischen Sicherheit und Entwicklung sein. Das Sicherheitsteam kann helfen, gepflasterte Straßen zu entwerfen, aber das Engineering muss einbezogen werden, um sie als Teil der Codebasis zu betreiben und zu warten.\n\n## Sicherheit ist eine Domain, kein Team{class=\"no-anchor\"}\n\nWir erleben bereits, dass Sicherheit immer mehr in den Bereich der Engineering-Teams rutscht, und können annehmen, dass die Grenzen zwischen den Bereichen auch weiter verschwimmen werden. Durch die rasche Einführung von KI und der damit einhergehenden Beschleunigung der Softwareentwicklung – 66 % der Befragten unserer Umfrage gaben an, dass sie Software bereits doppelt so schnell oder noch schneller veröffentlichen als im Vorjahr – ist es für Unternehmen äußerst wichtig, Systeme und Frameworks einzuführen, die für den größtmöglichen Sicherheitsvorteil optimiert sind. Deshalb ist die Idee einer kulturellen Trennung zwischen Entwicklung und Sicherheit nicht die ganze Geschichte. Es ist unerlässlich, eine Kultur der Zusammenarbeit zu fördern. Sicherheits- und Engineering-Teams müssen aber auch wirklich zusammenarbeiten, um die grundlegenden Aspekte der Softwareentwicklung neu zu durchdenken, wie etwa die Optimierung bestehender Codebases und der Aufbau skalierbarer Lösungen, bei denen das Engineering im Mittelpunkt steht und die nahtlos von technischen Teams im gesamten Unternehmen eingeführt werden können.","article","security-its-more-than-culture-addressing-the-root-cause-of-common-security","content:de-de:the-source:security:security-its-more-than-culture-addressing-the-root-cause-of-common-security:index.yml","yaml","content","de-de/the-source/security/security-its-more-than-culture-addressing-the-root-cause-of-common-security/index.yml","de-de/the-source/security/security-its-more-than-culture-addressing-the-root-cause-of-common-security/index","yml",{"_path":37,"_dir":38,"_draft":6,"_partial":6,"_locale":7,"data":39,"_id":339,"_type":31,"title":340,"_source":32,"_file":341,"_stem":342,"_extension":35},"/shared/de-de/main-footer","de-de",{"text":40,"source":41,"edit":47,"contribute":52,"config":57,"items":62,"minimal":331},"Git ist eine Marke von Software Freedom Conservancy und unsere Verwendung von „GitLab“ erfolgt unter Lizenz.",{"text":42,"config":43},"Quelltext der Seite anzeigen",{"href":44,"dataGaName":45,"dataGaLocation":46},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/","page source","footer",{"text":48,"config":49},"Diese Seite bearbeiten",{"href":50,"dataGaName":51,"dataGaLocation":46},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/content/","web ide",{"text":53,"config":54},"Beteilige dich",{"href":55,"dataGaName":56,"dataGaLocation":46},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/CONTRIBUTING.md/","please contribute",{"twitter":58,"facebook":59,"youtube":60,"linkedin":61},"https://x.com/gitlab","https://www.facebook.com/gitlab","https://www.youtube.com/channel/UCnMGQ8QHMAnVIsI3xJrihhg","https://www.linkedin.com/company/gitlab-com",[63,90,163,231,293],{"title":64,"links":65,"subMenu":71},"Plattform",[66],{"text":67,"config":68},"DevSecOps-Plattform",{"href":69,"dataGaName":70,"dataGaLocation":46},"/de-de/platform/","devsecops platform",[72],{"title":73,"links":74},"Preise",[75,80,85],{"text":76,"config":77},"Tarife anzeigen",{"href":78,"dataGaName":79,"dataGaLocation":46},"/de-de/pricing/","view plans",{"text":81,"config":82},"Vorteile von Premium",{"href":83,"dataGaName":84,"dataGaLocation":46},"/de-de/pricing/premium/","why premium",{"text":86,"config":87},"Vorteile von Ultimate",{"href":88,"dataGaName":89,"dataGaLocation":46},"/de-de/pricing/ultimate/","why ultimate",{"title":91,"links":92},"Lösungen",[93,98,103,108,113,118,123,128,133,138,143,148,153,158],{"text":94,"config":95},"Digitale Transformation",{"href":96,"dataGaName":97,"dataGaLocation":46},"/de-de/topics/digital-transformation/","digital transformation",{"text":99,"config":100},"Sicherheit und Compliance",{"href":101,"dataGaName":102,"dataGaLocation":46},"/de-de/solutions/security-compliance/","security & compliance",{"text":104,"config":105},"Automatisierte Softwarebereitstellung",{"href":106,"dataGaName":107,"dataGaLocation":46},"/de-de/solutions/delivery-automation/","automated software delivery",{"text":109,"config":110},"Agile Entwicklung",{"href":111,"dataGaName":112,"dataGaLocation":46},"/de-de/solutions/agile-delivery/","agile delivery",{"text":114,"config":115},"Cloud-Transformation",{"href":116,"dataGaName":117,"dataGaLocation":46},"/de-de/topics/cloud-native/","cloud transformation",{"text":119,"config":120},"SCM",{"href":121,"dataGaName":122,"dataGaLocation":46},"/de-de/solutions/source-code-management/","source code management",{"text":124,"config":125},"CI/CD",{"href":126,"dataGaName":127,"dataGaLocation":46},"/de-de/solutions/continuous-integration/","continuous integration & delivery",{"text":129,"config":130},"Wertstrommanagement",{"href":131,"dataGaName":132,"dataGaLocation":46},"/de-de/solutions/value-stream-management/","value stream management",{"text":134,"config":135},"GitOps",{"href":136,"dataGaName":137,"dataGaLocation":46},"/de-de/solutions/gitops/","gitops",{"text":139,"config":140},"Enterprise",{"href":141,"dataGaName":142,"dataGaLocation":46},"/de-de/enterprise/","enterprise",{"text":144,"config":145},"Kleinunternehmen",{"href":146,"dataGaName":147,"dataGaLocation":46},"/de-de/small-business/","small business",{"text":149,"config":150},"Öffentlicher Sektor",{"href":151,"dataGaName":152,"dataGaLocation":46},"/de-de/solutions/public-sector/","public sector",{"text":154,"config":155},"Bildungswesen",{"href":156,"dataGaName":157,"dataGaLocation":46},"/de-de/solutions/education/","education",{"text":159,"config":160},"Finanzdienstleistungen",{"href":161,"dataGaName":162,"dataGaLocation":46},"/de-de/solutions/finance/","financial services",{"title":164,"links":165},"Ressourcen",[166,171,176,181,186,191,196,201,206,211,216,221,226],{"text":167,"config":168},"Installieren",{"href":169,"dataGaName":170,"dataGaLocation":46},"/de-de/install/","install",{"text":172,"config":173},"Kurzanleitungen",{"href":174,"dataGaName":175,"dataGaLocation":46},"/de-de/get-started/","quick setup checklists",{"text":177,"config":178},"Lernen",{"href":179,"dataGaName":180,"dataGaLocation":46},"https://university.gitlab.com/","learn",{"text":182,"config":183},"Produktdokumentation",{"href":184,"dataGaName":185,"dataGaLocation":46},"https://docs.gitlab.com/","docs",{"text":187,"config":188},"Blog",{"href":189,"dataGaName":190,"dataGaLocation":46},"/de-de/blog/","blog",{"text":192,"config":193},"Kundenerfolge",{"href":194,"dataGaName":195,"dataGaLocation":46},"/customers/","customer success stories",{"text":197,"config":198},"Remote",{"href":199,"dataGaName":200,"dataGaLocation":46},"https://handbook.gitlab.com/handbook/company/culture/all-remote/","remote",{"text":202,"config":203},"GitLab-Services",{"href":204,"dataGaName":205,"dataGaLocation":46},"/de-de/services/","services",{"text":207,"config":208},"TeamOps",{"href":209,"dataGaName":210,"dataGaLocation":46},"/de-de/teamops/","teamops",{"text":212,"config":213},"Community",{"href":214,"dataGaName":215,"dataGaLocation":46},"/community/","community",{"text":217,"config":218},"Forum",{"href":219,"dataGaName":220,"dataGaLocation":46},"https://forum.gitlab.com/","forum",{"text":222,"config":223},"Veranstaltungen",{"href":224,"dataGaName":225,"dataGaLocation":46},"/events/","events",{"text":227,"config":228},"Partner",{"href":229,"dataGaName":230,"dataGaLocation":46},"/de-de/partners/","partners",{"title":232,"links":233},"Unternehmen",[234,239,244,249,254,259,264,268,273,278,283,288],{"text":235,"config":236},"Über",{"href":237,"dataGaName":238,"dataGaLocation":46},"/de-de/company/","company",{"text":240,"config":241},"Karriere",{"href":242,"dataGaName":243,"dataGaLocation":46},"/jobs/","jobs",{"text":245,"config":246},"Geschäftsführung",{"href":247,"dataGaName":248,"dataGaLocation":46},"/company/team/e-group/","leadership",{"text":250,"config":251},"Team",{"href":252,"dataGaName":253,"dataGaLocation":46},"/company/team/","team",{"text":255,"config":256},"Handbuch",{"href":257,"dataGaName":258,"dataGaLocation":46},"https://handbook.gitlab.com/","handbook",{"text":260,"config":261},"Investor Relations",{"href":262,"dataGaName":263,"dataGaLocation":46},"https://ir.gitlab.com/","investor relations",{"text":265,"config":266},"Sustainability",{"href":267,"dataGaName":265,"dataGaLocation":46},"/sustainability/",{"text":269,"config":270},"Vielfalt, Inklusion und Zugehörigkeit",{"href":271,"dataGaName":272,"dataGaLocation":46},"/diversity-inclusion-belonging/","Diversity, inclusion and belonging",{"text":274,"config":275},"Trust Center",{"href":276,"dataGaName":277,"dataGaLocation":46},"/de-de/security/","trust center",{"text":279,"config":280},"Newsletter",{"href":281,"dataGaName":282,"dataGaLocation":46},"/company/contact/","newsletter",{"text":284,"config":285},"Presse",{"href":286,"dataGaName":287,"dataGaLocation":46},"/press/","press",{"text":289,"config":290},"Transparenzerklärung zu moderner Sklaverei",{"href":291,"dataGaName":292,"dataGaLocation":46},"https://handbook.gitlab.com/handbook/legal/modern-slavery-act-transparency-statement/","modern slavery transparency statement",{"title":294,"links":295},"Nimm Kontakt auf",[296,301,306,311,316,321,326],{"text":297,"config":298},"Sprich mit einem Experten/einer Expertin",{"href":299,"dataGaName":300,"dataGaLocation":46},"/de-de/sales/","sales",{"text":302,"config":303},"Support",{"href":304,"dataGaName":305,"dataGaLocation":46},"/support/","get help",{"text":307,"config":308},"Kundenportal",{"href":309,"dataGaName":310,"dataGaLocation":46},"https://customers.gitlab.com/customers/sign_in/","customer portal",{"text":312,"config":313},"Status",{"href":314,"dataGaName":315,"dataGaLocation":46},"https://status.gitlab.com/","status",{"text":317,"config":318},"Nutzungsbedingungen",{"href":319,"dataGaName":320,"dataGaLocation":46},"/terms/","terms of use",{"text":322,"config":323},"Datenschutzerklärung",{"href":324,"dataGaName":325,"dataGaLocation":46},"/de-de/privacy/","privacy statement",{"text":327,"config":328},"Cookie-Einstellungen",{"dataGaName":329,"dataGaLocation":46,"id":330,"isOneTrustButton":13},"cookie preferences","ot-sdk-btn",{"items":332},[333,335,337],{"text":317,"config":334},{"href":319,"dataGaName":320,"dataGaLocation":46},{"text":322,"config":336},{"href":324,"dataGaName":325,"dataGaLocation":46},{"text":327,"config":338},{"dataGaName":329,"dataGaLocation":46,"id":330,"isOneTrustButton":13},"content:shared:de-de:main-footer.yml","Main Footer","shared/de-de/main-footer.yml","shared/de-de/main-footer",{"_path":344,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"logo":345,"subscribeLink":350,"navItems":354,"_id":366,"_type":31,"title":367,"_source":32,"_file":368,"_stem":369,"_extension":35},"/shared/de-de/the-source/navigation",{"altText":346,"config":347},"the source logo",{"src":348,"href":349},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1750191004/t7wz1klfb2kxkezksv9t.svg","/de-de/the-source/",{"text":351,"config":352},"Abonnieren",{"href":353},"#subscribe",[355,359,362],{"text":356,"config":357},"Künstliche Intelligenz",{"href":358},"/de-de/the-source/ai/",{"text":99,"config":360},{"href":361},"/de-de/the-source/security/",{"text":363,"config":364},"Plattform und Infrastruktur",{"href":365},"/de-de/the-source/platform/","content:shared:de-de:the-source:navigation.yml","Navigation","shared/de-de/the-source/navigation.yml","shared/de-de/the-source/navigation",{"_path":371,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"title":372,"description":373,"submitMessage":374,"formData":375,"_id":379,"_type":31,"_source":32,"_file":380,"_stem":381,"_extension":35},"/shared/de-de/the-source/newsletter","The-Source-Newsletter","Bleibe mit Erkenntnissen für die Zukunft der Softwareentwicklung auf dem Laufenden.","Du hast dich erfolgreich für den Newsletter von The Source angemeldet.",{"config":376},{"formId":377,"formName":378,"hideRequiredLabel":13},28465,"thesourcenewsletter","content:shared:de-de:the-source:newsletter.yml","shared/de-de/the-source/newsletter.yml","shared/de-de/the-source/newsletter",{"_path":383,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"config":384,"seo":385,"content":388,"type":402,"slug":5,"_id":403,"_type":31,"title":7,"_source":32,"_file":404,"_stem":405,"_extension":35},"/de-de/the-source/security",{"layout":9},{"title":99,"description":386,"ogImage":7,"config":387},"Erfahre, wie Unternehmen sicherstellen können, dass sie bei sich entwickelnden Sicherheitsbedrohungen und Compliance-Anforderungen immer auf dem neuesten Stand sind.",{"ignoreDescriptionCharLimit":13},[389,395],{"componentName":390,"componentContent":391},"TheSourceCategoryHero",{"title":99,"description":386,"image":392},{"config":393},{"src":394},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463273/aplkxrvwpii26xao5yhi.png",{"componentName":396,"componentContent":397},"TheSourceCategoryMainSection",{"config":398},{"gatedAssets":399},[400,401,14],"source-lp-guide-to-dynamic-sboms","source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain","category","content:de-de:the-source:security:index.yml","de-de/the-source/security/index.yml","de-de/the-source/security/index",{"_path":407,"_dir":408,"_draft":6,"_partial":6,"_locale":7,"config":409,"title":411,"description":412,"link":413,"_id":419,"_type":31,"_source":32,"_file":420,"_stem":421,"_extension":35},"/shared/de-de/the-source/gated-assets/application-security-in-the-digital-age","gated-assets",{"id":14,"formId":410},1002,"Anwendungssicherheit im digitalen Zeitalter","Lies dir die [Ergebnisse unserer Umfrage unter mehr als 5.000 DevSecOps-Expert(inn)en aus der ganzen Welt](https://about.gitlab.com/de-de/developer-survey/2024/security-compliance/) durch und erfahre, wie Unternehmen mit zunehmenden Angriffsflächen und sich ändernden Einstellungen zu Sicherheit und KI zu kämpfen haben.",{"text":414,"config":415},"Bericht lesen",{"href":416,"dataGaName":417,"dataGaLocation":418},"https://about.gitlab.com/developer-survey/2024/security-compliance","Application Security in the Digital Age","thesource","content:shared:de-de:the-source:gated-assets:application-security-in-the-digital-age.yml","shared/de-de/the-source/gated-assets/application-security-in-the-digital-age.yml","shared/de-de/the-source/gated-assets/application-security-in-the-digital-age",{"_path":383,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"config":423,"seo":424,"content":426,"type":402,"slug":5,"_id":403,"_type":31,"title":7,"_source":32,"_file":404,"_stem":405,"_extension":35},{"layout":9},{"title":99,"description":386,"ogImage":7,"config":425},{"ignoreDescriptionCharLimit":13},[427,431],{"componentName":390,"componentContent":428},{"title":99,"description":386,"image":429},{"config":430},{"src":394},{"componentName":396,"componentContent":432},{"config":433},{"gatedAssets":434},[400,401,14],[436,440,451],{"_path":407,"_dir":408,"_draft":6,"_partial":6,"_locale":7,"config":437,"title":411,"description":412,"link":438,"_id":419,"_type":31,"_source":32,"_file":420,"_stem":421,"_extension":35},{"id":14,"formId":410},{"text":414,"config":439},{"href":416,"dataGaName":417,"dataGaLocation":418},{"_path":441,"_dir":408,"_draft":6,"_partial":6,"_locale":7,"config":442,"title":443,"link":444,"_id":448,"_type":31,"_source":32,"_file":449,"_stem":450,"_extension":35},"/shared/de-de/the-source/gated-assets/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain",{"id":401},"A Field Guide to Threat Vectors in the Software Supply Chain (nur in englischer Sprache verfügbar)",{"config":445},{"href":446,"dataGaName":447,"dataGaLocation":418},"https://about.gitlab.com/the-source/security/field-guide-to-threat-vectors-in-the-software-supply-chain/","A field guide to threat vectors in the software supply chain","content:shared:de-de:the-source:gated-assets:source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain.yml","shared/de-de/the-source/gated-assets/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain.yml","shared/de-de/the-source/gated-assets/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain",{"_path":452,"_dir":408,"_draft":6,"_partial":6,"_locale":7,"config":453,"title":454,"description":455,"link":456,"_id":461,"_type":31,"_source":32,"_file":462,"_stem":463,"_extension":35},"/shared/de-de/the-source/gated-assets/source-lp-guide-to-dynamic-sboms",{"id":400},"GitLab-Leitfaden für dynamische SBOMs: Ein integraler Bestandteil der modernen Softwareentwicklung","Erfahre, wie du mit einer Software-Stückliste (SBOM) die Sichtbarkeit von bisher unerkannten organisatorischen Risiken verbesserst.",{"text":457,"config":458},"Jetzt den Leitfaden lesen",{"href":459,"dataGaName":460,"dataGaLocation":418},"https://about.gitlab.com/the-source/security/guide-to-dynamic-sboms/","Guide to Dynamic SBOMs","content:shared:de-de:the-source:gated-assets:source-lp-guide-to-dynamic-sboms.yml","shared/de-de/the-source/gated-assets/source-lp-guide-to-dynamic-sboms.yml","shared/de-de/the-source/gated-assets/source-lp-guide-to-dynamic-sboms",[465,488,504,520,536,557,577,593,611,631,648,669,685,703,720,738,757,775,794,815,835,851,867,885,903,922,938,956,972,991],{"_path":466,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":468,"seo":469,"content":471,"type":483,"slug":484,"_id":485,"_type":31,"title":470,"_source":32,"_file":486,"_stem":487,"_extension":35},"/de-de/the-source/authors/amanda-rueda","authors",{"layout":9},{"title":470},"Amanda Rueda",[472,481],{"componentName":473,"componentContent":474},"TheSourceAuthorHero",{"config":475,"name":470,"headshot":478},{"gitlabHandle":476,"linkedInProfileUrl":477},"amandarueda","https://www.linkedin.com/in/amandamrueda/",{"altText":470,"config":479},{"src":480},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463383/osecw1pzbxvb7fhqhiky.png",{"componentName":482},"TheSourceArticlesList","author","amanda-rueda","content:de-de:the-source:authors:amanda-rueda.yml","de-de/the-source/authors/amanda-rueda.yml","de-de/the-source/authors/amanda-rueda",{"_path":489,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":490,"seo":491,"content":493,"type":483,"slug":500,"_id":501,"_type":31,"title":492,"_source":32,"_file":502,"_stem":503,"_extension":35},"/de-de/the-source/authors/andre-michael-braun",{"layout":9},{"title":492},"Andre Michael Braun",[494,499],{"componentName":473,"componentContent":495},{"name":492,"headshot":496},{"altText":492,"config":497},{"src":498},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463336/yl27k7wdlnkzsizwknn1.jpg",{"componentName":482},"andre-michael-braun","content:de-de:the-source:authors:andre-michael-braun.yml","de-de/the-source/authors/andre-michael-braun.yml","de-de/the-source/authors/andre-michael-braun",{"_path":505,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":506,"seo":507,"content":509,"type":483,"slug":516,"_id":517,"_type":31,"title":508,"_source":32,"_file":518,"_stem":519,"_extension":35},"/de-de/the-source/authors/andrew-haschka",{"layout":9},{"title":508},"Andrew Haschka",[510,515],{"componentName":473,"componentContent":511},{"name":508,"headshot":512},{"altText":508,"config":513},{"src":514},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463349/z1qnc4uxmqgg3hnm3da4.png",{"componentName":482},"andrew-haschka","content:de-de:the-source:authors:andrew-haschka.yml","de-de/the-source/authors/andrew-haschka.yml","de-de/the-source/authors/andrew-haschka",{"_path":521,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":522,"seo":523,"content":525,"type":483,"slug":532,"_id":533,"_type":31,"title":524,"_source":32,"_file":534,"_stem":535,"_extension":35},"/de-de/the-source/authors/ayoub-fandi",{"layout":9},{"title":524},"Ayoub Fandi",[526,531],{"componentName":473,"componentContent":527},{"name":524,"headshot":528},{"altText":524,"config":529},{"src":530},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463329/wyp554loeyoibx3ozren.jpg",{"componentName":482},"ayoub-fandi","content:de-de:the-source:authors:ayoub-fandi.yml","de-de/the-source/authors/ayoub-fandi.yml","de-de/the-source/authors/ayoub-fandi",{"_path":537,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":538,"seo":539,"content":541,"type":483,"slug":553,"_id":554,"_type":31,"title":540,"_source":32,"_file":555,"_stem":556,"_extension":35},"/de-de/the-source/authors/brian-wald",{"layout":9},{"title":540},"Brian Wald",[542,552],{"componentName":473,"componentContent":543},{"config":544,"name":540,"role":547,"bio":548,"headshot":549},{"gitlabHandle":545,"linkedInProfileUrl":546},"brianwald","https://www.linkedin.com/in/brianwald/","Head of Global Field CTO org","Brian Wald ist Head of Global Field CTO Org bei GitLab. Er leitet ein dynamisches Team von Field CTOs, das sich der Transformation von Softwareentwicklungspraktiken für Unternehmen widmet.",{"altText":540,"config":550},{"src":551},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463417/fugpbux9miqbdx3wewtu.jpg",{"componentName":482},"brian-wald","content:de-de:the-source:authors:brian-wald.yml","de-de/the-source/authors/brian-wald.yml","de-de/the-source/authors/brian-wald",{"_path":558,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":559,"seo":560,"content":562,"type":483,"slug":573,"_id":574,"_type":31,"title":561,"_source":32,"_file":575,"_stem":576,"_extension":35},"/de-de/the-source/authors/bryan-ross",{"layout":9},{"title":561},"Bryan Ross",[563,572],{"componentName":473,"componentContent":564},{"config":565,"name":561,"headshot":569},{"gitlabHandle":566,"twitterXProfileUrl":567,"linkedInProfileUrl":568},"bryanrossuk","https://twitter.com/bryanrossuk","https://www.linkedin.com/in/bryanross",{"altText":561,"config":570},{"src":571},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463324/mvdyvskii4hltdrgqxom.jpg",{"componentName":482},"bryan-ross","content:de-de:the-source:authors:bryan-ross.yml","de-de/the-source/authors/bryan-ross.yml","de-de/the-source/authors/bryan-ross",{"_path":578,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":579,"seo":580,"content":582,"type":483,"slug":589,"_id":590,"_type":31,"title":581,"_source":32,"_file":591,"_stem":592,"_extension":35},"/de-de/the-source/authors/chandler-gibbons",{"layout":9},{"title":581},"Chandler Gibbons",[583,588],{"componentName":473,"componentContent":584},{"name":581,"headshot":585},{"altText":581,"config":586},{"src":587},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463362/o7g9fqtqtjvegfwniuxh.jpg",{"componentName":482},"chandler-gibbons","content:de-de:the-source:authors:chandler-gibbons.yml","de-de/the-source/authors/chandler-gibbons.yml","de-de/the-source/authors/chandler-gibbons",{"_path":594,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":595,"seo":596,"content":598,"type":483,"slug":607,"_id":608,"_type":31,"title":597,"_source":32,"_file":609,"_stem":610,"_extension":35},"/de-de/the-source/authors/dave-steer",{"layout":9},{"title":597},"Dave Steer",[599,606],{"componentName":473,"componentContent":600},{"config":601,"name":597,"headshot":603},{"gitlabHandle":602},"dsteer",{"altText":597,"config":604},{"src":605},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463457/zbtapdkglu3yb9suaq7w.png",{"componentName":482},"dave-steer","content:de-de:the-source:authors:dave-steer.yml","de-de/the-source/authors/dave-steer.yml","de-de/the-source/authors/dave-steer",{"_path":612,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":613,"seo":614,"content":616,"type":483,"slug":626,"_id":627,"_type":31,"title":628,"_source":32,"_file":629,"_stem":630,"_extension":35},"/de-de/the-source/authors/ddesanto",{"layout":9},{"title":615},"David DeSanto",[617,625],{"componentName":473,"componentContent":618},{"config":619,"name":615,"headshot":622},{"gitlabHandle":620,"linkedInProfileUrl":621},"david","https://www.linkedin.com/in/ddesanto/",{"altText":615,"config":623},{"src":624},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463446/bgnljs84zcsxj0t6nvix.png",{"componentName":482},"ddesanto","content:de-de:the-source:authors:ddesanto.yml","Ddesanto","de-de/the-source/authors/ddesanto.yml","de-de/the-source/authors/ddesanto",{"_path":632,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":633,"seo":634,"content":636,"type":483,"slug":643,"_id":644,"_type":31,"title":645,"_source":32,"_file":646,"_stem":647,"_extension":35},"/de-de/the-source/authors/derek-debellis",{"layout":9},{"title":635},"Derek DeBellis",[637,642],{"componentName":473,"componentContent":638},{"name":635,"headshot":639},{"altText":635,"config":640},{"src":641},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463385/sbnjwfaguszi5g2smzr7.png",{"componentName":482},"derek-debellis","content:de-de:the-source:authors:derek-debellis.yml","Derek Debellis","de-de/the-source/authors/derek-debellis.yml","de-de/the-source/authors/derek-debellis",{"_path":649,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":650,"seo":651,"content":653,"type":483,"slug":665,"_id":666,"_type":31,"title":652,"_source":32,"_file":667,"_stem":668,"_extension":35},"/de-de/the-source/authors/emilio-salvador",{"layout":9},{"title":652},"Emilio Salvador",[654,664],{"componentName":473,"componentContent":655},{"config":656,"name":652,"role":659,"bio":660,"headshot":661},{"gitlabHandle":657,"linkedInProfileUrl":658},"esalvadorp","https://www.linkedin.com/in/emiliosp/","Vice President, Strategy and Developer Relations","Emilio Salvador ist Vice President of Strategy and Developer Relations bei GitLab. Emilio ist Technologieexperte und verfügt über mehr als 20 Jahre Erfahrung. Er war bei Amazon und Microsoft tätig und leitete zuletzt bei Google die Strategie und den Betrieb des Teams Developer Advocacy and Experience. Er hat einen MBA-Abschluss der MIT Sloan School of Management.",{"altText":652,"config":662},{"src":663},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463402/g0snp3uisjm4tj3pkqcw.jpg",{"componentName":482},"emilio-salvador","content:de-de:the-source:authors:emilio-salvador.yml","de-de/the-source/authors/emilio-salvador.yml","de-de/the-source/authors/emilio-salvador",{"_path":670,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":671,"seo":672,"content":674,"type":483,"slug":681,"_id":682,"_type":31,"title":673,"_source":32,"_file":683,"_stem":684,"_extension":35},"/de-de/the-source/authors/erika-feldman",{"layout":9},{"title":673},"Erika Feldman",[675,680],{"componentName":473,"componentContent":676},{"name":673,"headshot":677},{"altText":673,"config":678},{"src":679},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463354/d9quqvz7d2ayjwif7vdn.png",{"componentName":482},"erika-feldman","content:de-de:the-source:authors:erika-feldman.yml","de-de/the-source/authors/erika-feldman.yml","de-de/the-source/authors/erika-feldman",{"_path":686,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":687,"seo":688,"content":690,"type":483,"slug":699,"_id":700,"_type":31,"title":689,"_source":32,"_file":701,"_stem":702,"_extension":35},"/de-de/the-source/authors/george-kichukov",{"layout":9},{"title":689},"George Kichukov",[691,698],{"componentName":473,"componentContent":692},{"config":693,"name":689,"headshot":695},{"gitlabHandle":694},"gkichukov",{"altText":689,"config":696},{"src":697},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463366/dk2knfancgsxocjkmyoa.jpg",{"componentName":482},"george-kichukov","content:de-de:the-source:authors:george-kichukov.yml","de-de/the-source/authors/george-kichukov.yml","de-de/the-source/authors/george-kichukov",{"_path":704,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":705,"seo":706,"content":708,"type":483,"slug":715,"_id":716,"_type":31,"title":717,"_source":32,"_file":718,"_stem":719,"_extension":35},"/de-de/the-source/authors/gitlab",{"layout":9},{"title":707},"GitLab",[709,714],{"componentName":473,"componentContent":710},{"name":707,"headshot":711},{"altText":707,"config":712},{"src":713},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463461/ts7io0hgpdyqylbzfire.png",{"componentName":482},"gitlab","content:de-de:the-source:authors:gitlab.yml","Gitlab","de-de/the-source/authors/gitlab.yml","de-de/the-source/authors/gitlab",{"_path":721,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":722,"seo":723,"content":725,"type":483,"slug":734,"_id":735,"_type":31,"title":724,"_source":32,"_file":736,"_stem":737,"_extension":35},"/de-de/the-source/authors/grant-hickman",{"layout":9},{"title":724},"Grant Hickman",[726,733],{"componentName":473,"componentContent":727},{"config":728,"name":724,"headshot":730},{"gitlabHandle":729},"g.hickman",{"altText":724,"config":731},{"src":732},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463463/f3uqwtugqotyhwutz5gu.png",{"componentName":482},"grant-hickman","content:de-de:the-source:authors:grant-hickman.yml","de-de/the-source/authors/grant-hickman.yml","de-de/the-source/authors/grant-hickman",{"_path":739,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":740,"seo":741,"content":743,"type":483,"slug":753,"_id":754,"_type":31,"title":742,"_source":32,"_file":755,"_stem":756,"_extension":35},"/de-de/the-source/authors/haim-snir",{"layout":9},{"title":742},"Haim Snir",[744,752],{"componentName":473,"componentContent":745},{"config":746,"name":742,"headshot":749},{"gitlabHandle":747,"linkedInProfileUrl":748},"hsnir1","https://www.linkedin.com/in/haimsnir/",{"altText":742,"config":750},{"src":751},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463395/nubmshvaq8wpomopllni.png",{"componentName":482},"haim-snir","content:de-de:the-source:authors:haim-snir.yml","de-de/the-source/authors/haim-snir.yml","de-de/the-source/authors/haim-snir",{"_path":758,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":759,"seo":760,"content":762,"type":483,"slug":766,"_id":771,"_type":31,"title":772,"_source":32,"_file":773,"_stem":774,"_extension":35},"/de-de/the-source/authors/iganbaruch",{"layout":9},{"title":761},"Itzik Gan Baruch",[763,770],{"componentName":473,"componentContent":764},{"config":765,"name":761,"headshot":767},{"gitlabHandle":766},"iganbaruch",{"altText":761,"config":768},{"src":769},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463443/vibb2fkc0ojni2d1eqde.png",{"componentName":482},"content:de-de:the-source:authors:iganbaruch.yml","Iganbaruch","de-de/the-source/authors/iganbaruch.yml","de-de/the-source/authors/iganbaruch",{"_path":776,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":777,"seo":778,"content":780,"type":483,"slug":789,"_id":790,"_type":31,"title":791,"_source":32,"_file":792,"_stem":793,"_extension":35},"/de-de/the-source/authors/jlongo",{"layout":9},{"title":779},"Joseph Longo",[781,788],{"componentName":473,"componentContent":782},{"config":783,"name":779,"headshot":785},{"gitlabHandle":784},"jlongo_gitlab",{"altText":779,"config":786},{"src":787},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463434/uoxaknpmoposbbgzqji8.png",{"componentName":482},"jlongo","content:de-de:the-source:authors:jlongo.yml","Jlongo","de-de/the-source/authors/jlongo.yml","de-de/the-source/authors/jlongo",{"_path":795,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":796,"seo":797,"content":799,"type":483,"slug":811,"_id":812,"_type":31,"title":798,"_source":32,"_file":813,"_stem":814,"_extension":35},"/de-de/the-source/authors/joel-krooswyk",{"layout":9},{"title":798},"Joel Krooswyk",[800,810],{"componentName":473,"componentContent":801},{"config":802,"name":798,"role":805,"bio":806,"headshot":807},{"gitlabHandle":803,"linkedInProfileUrl":804},"jkrooswyk","https://www.linkedin.com/in/joelrkrooswyk/","Federal CTO","Joel Krooswyk ist Federal CTO bei GitLab. Joel ist seit 2017 aktiv am Wachstum von GitLab beteiligt. Seine 25-jährige Führungserfahrung hat er nicht nur im öffentlichen Sektor der USA gesammelt, sondern auch in kleinen, mittleren und großen Unternehmen auf der ganzen Welt. Joel verbindet eine umfassende Expertise auf dem Gebiet der politischen Strategie mit langjähriger Erfahrung in den Bereichen Technologie, Softwareentwicklung, KI und Cybersicherheit. Seine Expertise wird regelmäßig sowohl von der Industrie als auch Behörden bei Fragen der Politik für Kommentare und Reaktionen in Anspruch genommen.",{"altText":798,"config":808},{"src":809},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463423/mkmdhuxsjggfvokdmdv7.jpg",{"componentName":482},"joel-krooswyk","content:de-de:the-source:authors:joel-krooswyk.yml","de-de/the-source/authors/joel-krooswyk.yml","de-de/the-source/authors/joel-krooswyk",{"_path":816,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":817,"seo":818,"content":820,"type":483,"slug":12,"_id":832,"_type":31,"title":819,"_source":32,"_file":833,"_stem":834,"_extension":35},"/de-de/the-source/authors/josh-lemos",{"layout":9},{"title":819},"Josh Lemos",[821,831],{"componentName":473,"componentContent":822},{"config":823,"name":819,"role":826,"bio":827,"headshot":828},{"gitlabHandle":824,"linkedInProfileUrl":825},"joshlemos","https://www.linkedin.com/in/joshlemos/","Chief Information Security Officer","Josh Lemos ist Chief Information Security Officer bei GitLab Inc. und bringt 20 Jahre Erfahrung in der Leitung von Informationssicherheitsteams in seine Rolle ein. Er ist für die Erstellung und Aufrechterhaltung der Unternehmensvision, -strategie und -programme verantwortlich, um sicherzustellen, dass Informationsressourcen und Technologien angemessen geschützt sind, die Gitlab-DevSecOps-Plattform zu stärken und den Kund(inn)en ein Höchstmaß an Sicherheit zu bieten.",{"altText":819,"config":829},{"src":830},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463405/f4rqtiecakrekvxfhqar.jpg",{"componentName":482},"content:de-de:the-source:authors:josh-lemos.yml","de-de/the-source/authors/josh-lemos.yml","de-de/the-source/authors/josh-lemos",{"_path":836,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":837,"seo":838,"content":840,"type":483,"slug":847,"_id":848,"_type":31,"title":839,"_source":32,"_file":849,"_stem":850,"_extension":35},"/de-de/the-source/authors/julie-griffin",{"layout":9},{"title":839},"Julie Griffin",[841,846],{"componentName":473,"componentContent":842},{"name":839,"headshot":843},{"altText":839,"config":844},{"src":845},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463371/hqkbr3uk8hw2de7tltn4.webp",{"componentName":482},"julie-griffin","content:de-de:the-source:authors:julie-griffin.yml","de-de/the-source/authors/julie-griffin.yml","de-de/the-source/authors/julie-griffin",{"_path":852,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":853,"seo":854,"content":856,"type":483,"slug":863,"_id":864,"_type":31,"title":855,"_source":32,"_file":865,"_stem":866,"_extension":35},"/de-de/the-source/authors/kristina-weis",{"layout":9},{"title":855},"Kristina Weis",[857,862],{"componentName":473,"componentContent":858},{"name":855,"headshot":859},{"altText":855,"config":860},{"src":861},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463469/eoolq6n6bs0zb8gmf0js.webp",{"componentName":482},"kristina-weis","content:de-de:the-source:authors:kristina-weis.yml","de-de/the-source/authors/kristina-weis.yml","de-de/the-source/authors/kristina-weis",{"_path":868,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":869,"seo":870,"content":872,"type":483,"slug":881,"_id":882,"_type":31,"title":871,"_source":32,"_file":883,"_stem":884,"_extension":35},"/de-de/the-source/authors/lee-faus",{"layout":9},{"title":871},"Lee Faus",[873,880],{"componentName":473,"componentContent":874},{"config":875,"name":871,"headshot":877},{"gitlabHandle":876},"lfaus",{"altText":871,"config":878},{"src":879},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463398/vivhlomglvnstamj54bo.jpg",{"componentName":482},"lee-faus","content:de-de:the-source:authors:lee-faus.yml","de-de/the-source/authors/lee-faus.yml","de-de/the-source/authors/lee-faus",{"_path":886,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":887,"seo":888,"content":890,"type":483,"slug":894,"_id":899,"_type":31,"title":900,"_source":32,"_file":901,"_stem":902,"_extension":35},"/de-de/the-source/authors/ncregan",{"layout":9},{"title":889},"Niall Cregan",[891,898],{"componentName":473,"componentContent":892},{"config":893,"name":889,"headshot":895},{"gitlabHandle":894},"ncregan",{"altText":889,"config":896},{"src":897},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463431/yrtwodocb4cu3j7lkhyo.png",{"componentName":482},"content:de-de:the-source:authors:ncregan.yml","Ncregan","de-de/the-source/authors/ncregan.yml","de-de/the-source/authors/ncregan",{"_path":904,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":905,"seo":906,"content":908,"type":483,"slug":917,"_id":918,"_type":31,"title":919,"_source":32,"_file":920,"_stem":921,"_extension":35},"/de-de/the-source/authors/rschulman",{"layout":9},{"title":907},"Robin Schulman",[909,916],{"componentName":473,"componentContent":910},{"config":911,"name":907,"headshot":913},{"gitlabHandle":912},"robin",{"altText":907,"config":914},{"src":915},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463437/u2xfbudw1f8hhnkrgaoy.webp",{"componentName":482},"rschulman","content:de-de:the-source:authors:rschulman.yml","Rschulman","de-de/the-source/authors/rschulman.yml","de-de/the-source/authors/rschulman",{"_path":923,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":924,"seo":925,"content":927,"type":483,"slug":934,"_id":935,"_type":31,"title":926,"_source":32,"_file":936,"_stem":937,"_extension":35},"/de-de/the-source/authors/sabrina-farmer",{"layout":9},{"title":926},"Sabrina Farmer",[928,933],{"componentName":473,"componentContent":929},{"name":926,"headshot":930},{"altText":926,"config":931},{"src":932},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463377/udmzbjjr5xrcrffdlphx.webp",{"componentName":482},"sabrina-farmer","content:de-de:the-source:authors:sabrina-farmer.yml","de-de/the-source/authors/sabrina-farmer.yml","de-de/the-source/authors/sabrina-farmer",{"_path":939,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":940,"seo":941,"content":943,"type":483,"slug":952,"_id":953,"_type":31,"title":942,"_source":32,"_file":954,"_stem":955,"_extension":35},"/de-de/the-source/authors/sandra-gittlen",{"layout":9},{"title":942},"Sandra Gittlen",[944,951],{"componentName":473,"componentContent":945},{"config":946,"name":942,"headshot":948},{"gitlabHandle":947},"sgittlen",{"altText":942,"config":949},{"src":950},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463466/r7ckb9h2zr4c2rsz3zlm.png",{"componentName":482},"sandra-gittlen","content:de-de:the-source:authors:sandra-gittlen.yml","de-de/the-source/authors/sandra-gittlen.yml","de-de/the-source/authors/sandra-gittlen",{"_path":957,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":958,"seo":959,"content":961,"type":483,"slug":968,"_id":969,"_type":31,"title":960,"_source":32,"_file":970,"_stem":971,"_extension":35},"/de-de/the-source/authors/sharon-gaudin",{"layout":9},{"title":960},"Sharon Gaudin",[962,967],{"componentName":473,"componentContent":963},{"name":960,"headshot":964},{"altText":960,"config":965},{"src":966},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463475/h6j4nnvykzyfzgvl7txb.webp",{"componentName":482},"sharon-gaudin","content:de-de:the-source:authors:sharon-gaudin.yml","de-de/the-source/authors/sharon-gaudin.yml","de-de/the-source/authors/sharon-gaudin",{"_path":973,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":974,"seo":975,"content":977,"type":483,"slug":987,"_id":988,"_type":31,"title":976,"_source":32,"_file":989,"_stem":990,"_extension":35},"/de-de/the-source/authors/stephen-walters",{"layout":9},{"title":976},"Stephen Walters",[978,986],{"componentName":473,"componentContent":979},{"config":980,"name":976,"headshot":983},{"gitlabHandle":981,"linkedInProfileUrl":982},"swalters1","https://www.linkedin.com/in/1stephenwalters/",{"altText":976,"config":984},{"src":985},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463392/g6ktk5qb4vcqc9wqjlf9.jpg",{"componentName":482},"stephen-walters","content:de-de:the-source:authors:stephen-walters.yml","de-de/the-source/authors/stephen-walters.yml","de-de/the-source/authors/stephen-walters",{"_path":992,"_dir":467,"_draft":6,"_partial":6,"_locale":7,"config":993,"seo":994,"content":996,"type":483,"slug":1008,"_id":1009,"_type":31,"title":1010,"_source":32,"_file":1011,"_stem":1012,"_extension":35},"/de-de/the-source/authors/taylor-mccaslin",{"layout":9},{"title":995},"Taylor McCaslin",[997,1007],{"componentName":473,"componentContent":998},{"config":999,"name":995,"role":1002,"bio":1003,"headshot":1004},{"gitlabHandle":1000,"linkedInProfileUrl":1001},"tmccaslin","https://www.linkedin.com/in/taylormccaslin/","Group Manager, Product – Data Science","Taylor McCaslin ist Product Lead für KI/ML bei GitLab und leitet dort das Team der Produktmanager(innen), die die Arbeitsgruppen AI Powered und ModelOps betreuen, und legt die Vision und die Richtung fest, wie Benutzer(innen) von GitLab im Rahmen ihres DevOps-Programms von Data Science profitieren können. Bevor er zu GitLab kam, war er bei Indeed, Duo Security und WP Engine tätig.",{"altText":995,"config":1005},{"src":1006},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463427/trfasilaeasosxfcxmsm.jpg",{"componentName":482},"taylor-mccaslin","content:de-de:the-source:authors:taylor-mccaslin.yml","Taylor Mccaslin","de-de/the-source/authors/taylor-mccaslin.yml","de-de/the-source/authors/taylor-mccaslin",1753733169765]