[{"data":1,"prerenderedAt":1040},["ShallowReactive",2],{"/de-de/the-source/security/key-security-trends-for-cisos-in-2025":3,"footer-de-de":35,"the-source-banner-de-de":343,"the-source-navigation-de-de":355,"the-source-newsletter-de-de":382,"footer-source-/de-de/the-source/security/key-security-trends-for-cisos-in-2025/":393,"article-site-categories-de-de":398,"key-security-trends-for-cisos-in-2025-article-hero-category-de-de":400,"key-security-trends-for-cisos-in-2025-the-source-source-cta-de-de":425,"key-security-trends-for-cisos-in-2025-category-de-de":440,"key-security-trends-for-cisos-in-2025-the-source-resources-de-de":453,"key-security-trends-for-cisos-in-2025-article-hero-author-de-de":491},{"_path":4,"_dir":5,"_draft":6,"_partial":6,"_locale":7,"config":8,"seo":13,"content":17,"type":26,"category":5,"slug":27,"_id":28,"_type":29,"title":30,"_source":31,"_file":32,"_stem":33,"_extension":34},"/de-de/the-source/security/key-security-trends-for-cisos-in-2025","security",false,"",{"layout":9,"template":10,"author":11,"featured":6,"sourceCTA":12},"the-source","TheSourceArticle","josh-lemos","source-lp-ai-guide-for-enterprise-leaders-building-the-right-approach",{"title":14,"description":15,"ogImage":16},"Wichtige Sicherheitstrends für CISOs im Jahr 2025","Entdecke die Sicherheitstrends 2025 und erfahre, wie KI neue Risiken, aber auch Chancen schafft, das Identitätsmanagement umgestaltet und DevOps-Teams stärkt.","https://res.cloudinary.com/about-gitlab-com/image/upload/v1751464506/hyue0lgqq2lqk3arwnel.jpg",{"title":14,"date":18,"description":19,"timeToRead":20,"heroImage":16,"keyTakeaways":21,"articleBody":25},"2025-02-25","Entdecke die wichtigsten Sicherheitstrends im Jahr 2025 und erfahre, wie KI neue Risiken, aber auch Chancen schafft, das Identitätsmanagement umgestaltet und DevOps-Teams stärkt.","Lesezeit: 5 Min.",[22,23,24],"Die Einführung von KI birgt sowohl Sicherheitsrisiken als auch Chancen. Unternehmen müssen die KI-Nutzung in Produkten ihrer Anbieter nachverfolgen, sich auf potenzielle Ausfälle vorbereiten und die KI nutzen, um Sicherheitskontrollen zu stärken.","Das Identitätsmanagement muss modernisiert werden, um komplexen Interaktionen zwischen Maschinen, dynamischen Berechtigungen und Zugriffsberechtigungen für KI-Systeme gerecht zu werden. Dazu sind flexiblere und adaptive Sicherheitstools erforderlich.","KI-Tools können dazu beitragen, Lücken bei den Sicherheitskompetenzen im DevOps-Bereich zu überbrücken, indem sie sichere Coding Patterns vorschlagen und Sicherheit in den gesamten Software-Entwicklungsprozess integrieren.","2025 werden viele wichtige Sicherheitstools KI-Modelle enthalten, die du nicht untersuchen oder nicht vollständig kontrollieren kannst. Dein Vorstand fragt vielleicht bereits, wie du den nächsten Sicherheitsverstoß, der groß auf den Titelseiten prangen wird, verhindern wirst. In der Zwischenzeit nutzen deine Konkurrenten KI, um Sicherheit in einem Ausmaß zu automatisieren, das noch vor wenigen Monaten unmöglich schien. Dazu kommen aufkommende regulatorische Anforderungen, die das Ganze zusätzlich komplex machen, wie etwa in der Europäischen Union und in Kalifornien, wo neue Vorschriften die Nutzung von KI-Systemen beeinflussen.\n\nDie Sicherheitslandschaft entwickelt sich rasend schnell weiter, doch mit dem richtigen Ansatz kannst du diese Herausforderungen zu deinem Vorteil machen, um eine stärkere Abwehr zu erschaffen und dich vor neuen Cyberbedrohungen zu schützen. Hier findest du drei Trends, die die Sicherheitslandschaft für Unternehmen in diesem Jahr beschäftigen werden und auf die du dich vorbereiten solltest.\n\n## 1. Sicherheitslücken in proprietären LLMs\nViele Anbieter nutzen derzeit proprietäre große Sprachmodelle (LLMs) als Grundlage für ihre Produkte, durch die neue Risiken für dein Unternehmen entstehen. Die meisten dieser LLMs sind undurchsichtig, sodass du nicht sehen kannst, wie sie funktionieren oder welche Sicherheitskontrollen sie verwenden. Sicherheitsexpert(inn)en haben bereits bewiesen, wie fragil KI-Leitlinien sind. Die Modelle selbst bieten eine immer größere Angriffsfläche – und damit auch die Produkte, die auf diesen Modellen basieren.\n\nDa viele Produkte auf einigen wenigen proprietären LLMs basieren, könnte sich ein Angriff auf eines dieser Modelle gleichzeitig auf viele deiner Systeme auswirken. Diese Risikokonzentration ist besonders besorgniserregend, da immer mehr wichtige geschäftliche Funktionen auf KI-basierten Tools aufbauen. Du musst daher:\n\n- Nachverfolgen, welche deiner Anbieter LLMs verwenden\n- Die Sicherheitskontrollen dieser Anbieter beurteilen\n- Mögliche Ausfälle einplanen, wenn ein LLM-basierter Dienst ausfällt\n- Backup-Pläne für wichtige, von KI abhängige Systeme entwickeln\n\n> Weiterlesen: [7 Transparenzfragen an deinen DevOps-KI-Anbieter](https://about.gitlab.com/the-source/ai/building-a-transparency-first-ai-strategy-7-questions-to-ask-your-devops/)\n\n## 2. Herausforderungen beim Identitätsmanagement\nCloud- und KI-Systeme verändern die Art und Weise, wie wir den Zugang zu unseren täglich genutzten Systemen verwalten. Deine Identitätssysteme müssen nun Folgendes bewältigen:\n\n- Einen Anstieg an nicht menschlichen, dienstbasierten Identitäten\n- Mehr Verbindungen zwischen Maschinen\n- Schnellere Änderungen dessen, wer auf was zugreifen darf\n- Komplexe Berechtigungsketten zwischen Diensten\n- KI-Systeme, die verschiedene Ebenen des Datenzugriffs benötigen\n\nTraditionelle Tools für Identitäts- und Zugriffsmanagement wurden nicht für diese Herausforderungen entwickelt. Du brauchst flexiblere Identitätstools, die sich schnell an deine sich ändernden Bedürfnisse anpassen können. Erwäge [Zero-Trust-Prinzipien sowie Just-in-Time-Zugriff (nur in englischer Sprache verfügbar)](https://about.gitlab.com/the-source/security/field-guide-to-threat-vectors-in-the-software-supply-chain/), um in diesen dynamischen Umgebungen mehr Kontrolle zu haben.\n\nSicherheitsteams sollten auch Strategien entwickeln und sich auf die wachsende Komplexität einer agentischen KI vorbereiten, wobei dieselbe Strenge und Überwachbarkeit wie bei menschlichen Benutzer(inne)n gelten sollten. Da sich KI-Systeme immer weiter verbreiten, wird es ebenso wichtig, diese [nicht menschlichen Identitäten nachzuverfolgen und zu sichern (nur in englischer Sprache verfügbar)](https://about.gitlab.com/blog/improve-ai-security-in-gitlab-with-composite-identities/), wie es beim Zugriff menschlicher Benutzer(innen) ist.## 3. Sicherheit in DevOps\nIn einer [kürzlich durchgeführten Umfrage](https://about.gitlab.com/developer-survey/) gaben 58 % der Entwickler(innen) an, dass sie ein gewisses Maß an Verantwortung für die Anwendungssicherheit empfinden. Dennoch bleibt es schwierig, DevOps-Mitarbeitende mit Fähigkeiten im Sicherheitsbereich zu finden. KI-basierte Tools können dabei helfen, indem sie:\n\n- Code früh im Entwicklungsprozess auf Sicherheitslücken und potenzielle Bedrohungen überprüfen, bevor diese Probleme verursachen können\n- Sichere Coding Patterns vorschlagen\n- Automatisch die richtigen Zugriffsberechtigungen festlegen\n- Sich wiederholende Aufgaben im gesamten Entwicklungsprozess automatisieren.\n\nDiese Tools können dein bestehendes Sicherheitsteam darin unterstützen, effizienter zu arbeiten. Sie können Entwickler(inne)n auch dabei helfen, häufige Sicherheitsprobleme zu erkennen, bevor der Code in die Produktion geht. Dies bedeutet weniger Notfälle für dein Team und insgesamt bessere Sicherheitsergebnisse.\n\nErwäge, in Tools zu investieren, die sich direkt in die Workflows der Entwickler(innen) integrieren lassen. Je einfacher du es den Entwickler(inne)n machst, sicher zu arbeiten, desto wahrscheinlicher werden sie es auch wirklich tun.\n\n## Jetzt bist du dran: Nutze die KI, um dich vor Bedrohungen zu schützen\nGehe folgendermaßen vor, um diesen Veränderungen einen Schritt voraus zu sein:\n\n1. Sieh dir an, wo KI-Tools mit deinen Systemen in Kontakt kommen, und bewerte die Risiken.\n1. Aktualisiere deinen Ansatz für das Identitätsmanagement für Cloud- und KI-Anforderungen.\n1. Suche nach Möglichkeiten, wie die KI deine Sicherheit verbessern kann.\n1. Informiere deinen Vorstand über neue KI-Risiken und -Vorschriften.\n1. Baue Beziehungen zu wichtigen Anbietern auf, um ihre KI-Sicherheitsmaßnahmen zu verstehen.\n1. Schule dein Team zu KI-Sicherheitsrisiken und -Chancen.\n\nWährend die KI zwar neue Risiken mit sich bringt, bietet sie auch neue Tools zum Schutz deines Unternehmens. Fokussiere dich darauf, mithilfe der KI deine Sicherheitslage zu verbessern, während du gleichzeitig Ausschau nach neuen Bedrohungen hältst. Indem du deine KI-Sicherheitslage regelmäßig überprüfst, bist du aufkommenden Risiken immer einen Schritt voraus.\n\n## Ausblick\nDie Sicherheitslandschaft wird sich mit dem Fortschritt der KI-Technologie weiterentwickeln. Bleibe flexibel und passe deine Sicherheitsstrategie an, wenn neue Bedrohungen und Chancen auftauchen. Intensiviere die Zusammenarbeit in deinem Unternehmen, insbesondere mit den Rechts-, Entwicklungs- und IT-Betriebsteams. Diese Kooperation hilft dir, effektiver auf Sicherheitsherausforderungen zu reagieren.\n\nDenke daran, dass sich zwar die Technologie ändert, deine wichtigste Mission jedoch gleich bleibt: der Schutz deiner Unternehmens-Assets sowie ein sicherer Geschäftsbetrieb. Nutze neue Tools und Ansätze, wenn sie sinnvoll sind, verliere jedoch bei all dem Trubel rund um die KI-Einführung nicht die Grundsätze der Sicherheit aus den Augen.","article","key-security-trends-for-cisos-in-2025","content:de-de:the-source:security:key-security-trends-for-cisos-in-2025.yml","yaml","Key Security Trends For Cisos In 2025","content","de-de/the-source/security/key-security-trends-for-cisos-in-2025.yml","de-de/the-source/security/key-security-trends-for-cisos-in-2025","yml",{"_path":36,"_dir":37,"_draft":6,"_partial":6,"_locale":7,"data":38,"_id":339,"_type":29,"title":340,"_source":31,"_file":341,"_stem":342,"_extension":34},"/shared/de-de/main-footer","de-de",{"text":39,"source":40,"edit":46,"contribute":51,"config":56,"items":61,"minimal":331},"Git ist eine Marke von Software Freedom Conservancy und unsere Verwendung von „GitLab“ erfolgt unter Lizenz.",{"text":41,"config":42},"Quelltext der Seite anzeigen",{"href":43,"dataGaName":44,"dataGaLocation":45},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/","page source","footer",{"text":47,"config":48},"Diese Seite bearbeiten",{"href":49,"dataGaName":50,"dataGaLocation":45},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/content/","web ide",{"text":52,"config":53},"Beteilige dich",{"href":54,"dataGaName":55,"dataGaLocation":45},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/CONTRIBUTING.md/","please contribute",{"twitter":57,"facebook":58,"youtube":59,"linkedin":60},"https://x.com/gitlab","https://www.facebook.com/gitlab","https://www.youtube.com/channel/UCnMGQ8QHMAnVIsI3xJrihhg","https://www.linkedin.com/company/gitlab-com",[62,89,162,230,292],{"title":63,"links":64,"subMenu":70},"Plattform",[65],{"text":66,"config":67},"DevSecOps-Plattform",{"href":68,"dataGaName":69,"dataGaLocation":45},"/de-de/platform/","devsecops platform",[71],{"title":72,"links":73},"Preise",[74,79,84],{"text":75,"config":76},"Tarife anzeigen",{"href":77,"dataGaName":78,"dataGaLocation":45},"/de-de/pricing/","view plans",{"text":80,"config":81},"Vorteile von Premium",{"href":82,"dataGaName":83,"dataGaLocation":45},"/de-de/pricing/premium/","why premium",{"text":85,"config":86},"Vorteile von Ultimate",{"href":87,"dataGaName":88,"dataGaLocation":45},"/de-de/pricing/ultimate/","why ultimate",{"title":90,"links":91},"Lösungen",[92,97,102,107,112,117,122,127,132,137,142,147,152,157],{"text":93,"config":94},"Digitale Transformation",{"href":95,"dataGaName":96,"dataGaLocation":45},"/de-de/topics/digital-transformation/","digital transformation",{"text":98,"config":99},"Sicherheit und Compliance",{"href":100,"dataGaName":101,"dataGaLocation":45},"/de-de/solutions/application-security-testing/","Application security testing",{"text":103,"config":104},"Automatisierte Softwarebereitstellung",{"href":105,"dataGaName":106,"dataGaLocation":45},"/de-de/solutions/delivery-automation/","automated software delivery",{"text":108,"config":109},"Agile Entwicklung",{"href":110,"dataGaName":111,"dataGaLocation":45},"/de-de/solutions/agile-delivery/","agile delivery",{"text":113,"config":114},"Cloud-Transformation",{"href":115,"dataGaName":116,"dataGaLocation":45},"/de-de/topics/cloud-native/","cloud transformation",{"text":118,"config":119},"SCM",{"href":120,"dataGaName":121,"dataGaLocation":45},"/de-de/solutions/source-code-management/","source code management",{"text":123,"config":124},"CI/CD",{"href":125,"dataGaName":126,"dataGaLocation":45},"/de-de/solutions/continuous-integration/","continuous integration & delivery",{"text":128,"config":129},"Wertstrommanagement",{"href":130,"dataGaName":131,"dataGaLocation":45},"/de-de/solutions/value-stream-management/","value stream management",{"text":133,"config":134},"GitOps",{"href":135,"dataGaName":136,"dataGaLocation":45},"/de-de/solutions/gitops/","gitops",{"text":138,"config":139},"Enterprise",{"href":140,"dataGaName":141,"dataGaLocation":45},"/de-de/enterprise/","enterprise",{"text":143,"config":144},"Kleinunternehmen",{"href":145,"dataGaName":146,"dataGaLocation":45},"/de-de/small-business/","small business",{"text":148,"config":149},"Öffentlicher Sektor",{"href":150,"dataGaName":151,"dataGaLocation":45},"/de-de/solutions/public-sector/","public sector",{"text":153,"config":154},"Bildungswesen",{"href":155,"dataGaName":156,"dataGaLocation":45},"/de-de/solutions/education/","education",{"text":158,"config":159},"Finanzdienstleistungen",{"href":160,"dataGaName":161,"dataGaLocation":45},"/de-de/solutions/finance/","financial services",{"title":163,"links":164},"Ressourcen",[165,170,175,180,185,190,195,200,205,210,215,220,225],{"text":166,"config":167},"Installieren",{"href":168,"dataGaName":169,"dataGaLocation":45},"/de-de/install/","install",{"text":171,"config":172},"Kurzanleitungen",{"href":173,"dataGaName":174,"dataGaLocation":45},"/de-de/get-started/","quick setup checklists",{"text":176,"config":177},"Lernen",{"href":178,"dataGaName":179,"dataGaLocation":45},"https://university.gitlab.com/","learn",{"text":181,"config":182},"Produktdokumentation",{"href":183,"dataGaName":184,"dataGaLocation":45},"https://docs.gitlab.com/","docs",{"text":186,"config":187},"Blog",{"href":188,"dataGaName":189,"dataGaLocation":45},"/de-de/blog/","blog",{"text":191,"config":192},"Kundenerfolge",{"href":193,"dataGaName":194,"dataGaLocation":45},"/de-de/customers/","customer success stories",{"text":196,"config":197},"Remote",{"href":198,"dataGaName":199,"dataGaLocation":45},"https://handbook.gitlab.com/handbook/company/culture/all-remote/","remote",{"text":201,"config":202},"GitLab-Services",{"href":203,"dataGaName":204,"dataGaLocation":45},"/de-de/services/","services",{"text":206,"config":207},"TeamOps",{"href":208,"dataGaName":209,"dataGaLocation":45},"/de-de/teamops/","teamops",{"text":211,"config":212},"Community",{"href":213,"dataGaName":214,"dataGaLocation":45},"/community/","community",{"text":216,"config":217},"Forum",{"href":218,"dataGaName":219,"dataGaLocation":45},"https://forum.gitlab.com/","forum",{"text":221,"config":222},"Veranstaltungen",{"href":223,"dataGaName":224,"dataGaLocation":45},"/events/","events",{"text":226,"config":227},"Partner",{"href":228,"dataGaName":229,"dataGaLocation":45},"/de-de/partners/","partners",{"title":231,"links":232},"Unternehmen",[233,238,243,248,253,258,263,267,272,277,282,287],{"text":234,"config":235},"Über",{"href":236,"dataGaName":237,"dataGaLocation":45},"/de-de/company/","company",{"text":239,"config":240},"Karriere",{"href":241,"dataGaName":242,"dataGaLocation":45},"/jobs/","jobs",{"text":244,"config":245},"Geschäftsführung",{"href":246,"dataGaName":247,"dataGaLocation":45},"/company/team/e-group/","leadership",{"text":249,"config":250},"Team",{"href":251,"dataGaName":252,"dataGaLocation":45},"/company/team/","team",{"text":254,"config":255},"Handbuch",{"href":256,"dataGaName":257,"dataGaLocation":45},"https://handbook.gitlab.com/","handbook",{"text":259,"config":260},"Investor Relations",{"href":261,"dataGaName":262,"dataGaLocation":45},"https://ir.gitlab.com/","investor relations",{"text":264,"config":265},"Sustainability",{"href":266,"dataGaName":264,"dataGaLocation":45},"/sustainability/",{"text":268,"config":269},"Vielfalt, Inklusion und Zugehörigkeit",{"href":270,"dataGaName":271,"dataGaLocation":45},"/de-de/diversity-inclusion-belonging/","Diversity, inclusion and belonging",{"text":273,"config":274},"Trust Center",{"href":275,"dataGaName":276,"dataGaLocation":45},"/de-de/security/","trust center",{"text":278,"config":279},"Newsletter",{"href":280,"dataGaName":281,"dataGaLocation":45},"/company/contact/","newsletter",{"text":283,"config":284},"Presse",{"href":285,"dataGaName":286,"dataGaLocation":45},"/press/","press",{"text":288,"config":289},"Transparenzerklärung zu moderner Sklaverei",{"href":290,"dataGaName":291,"dataGaLocation":45},"https://handbook.gitlab.com/handbook/legal/modern-slavery-act-transparency-statement/","modern slavery transparency statement",{"title":293,"links":294},"Nimm Kontakt auf",[295,300,305,310,315,320,325],{"text":296,"config":297},"Sprich mit einem Experten/einer Expertin",{"href":298,"dataGaName":299,"dataGaLocation":45},"/de-de/sales/","sales",{"text":301,"config":302},"Support",{"href":303,"dataGaName":304,"dataGaLocation":45},"/support/","get help",{"text":306,"config":307},"Kundenportal",{"href":308,"dataGaName":309,"dataGaLocation":45},"https://customers.gitlab.com/customers/sign_in/","customer portal",{"text":311,"config":312},"Status",{"href":313,"dataGaName":314,"dataGaLocation":45},"https://status.gitlab.com/","status",{"text":316,"config":317},"Nutzungsbedingungen",{"href":318,"dataGaName":319,"dataGaLocation":45},"/terms/","terms of use",{"text":321,"config":322},"Datenschutzerklärung",{"href":323,"dataGaName":324,"dataGaLocation":45},"/de-de/privacy/","privacy statement",{"text":326,"config":327},"Cookie-Einstellungen",{"dataGaName":328,"dataGaLocation":45,"id":329,"isOneTrustButton":330},"cookie preferences","ot-sdk-btn",true,{"items":332},[333,335,337],{"text":316,"config":334},{"href":318,"dataGaName":319,"dataGaLocation":45},{"text":321,"config":336},{"href":323,"dataGaName":324,"dataGaLocation":45},{"text":326,"config":338},{"dataGaName":328,"dataGaLocation":45,"id":329,"isOneTrustButton":330},"content:shared:de-de:main-footer.yml","Main Footer","shared/de-de/main-footer.yml","shared/de-de/main-footer",{"_path":344,"_dir":345,"_draft":6,"_partial":6,"_locale":7,"id":346,"visibility":330,"title":347,"button":348,"_id":352,"_type":29,"_source":31,"_file":353,"_stem":354,"_extension":34},"/shared/de-de/the-source/banner/the-economics-of-software-innovation-2025-08-18","banner","The Economics of Software Innovation","The Economics of Software Innovation—AI’s $750 Billion Opportunity",{"config":349,"text":351},{"href":350},"/software-innovation-report/","Get the research report","content:shared:de-de:the-source:banner:the-economics-of-software-innovation-2025-08-18.yml","shared/de-de/the-source/banner/the-economics-of-software-innovation-2025-08-18.yml","shared/de-de/the-source/banner/the-economics-of-software-innovation-2025-08-18",{"_path":356,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"logo":357,"subscribeLink":362,"navItems":366,"_id":378,"_type":29,"title":379,"_source":31,"_file":380,"_stem":381,"_extension":34},"/shared/de-de/the-source/navigation",{"altText":358,"config":359},"the source logo",{"src":360,"href":361},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1750191004/t7wz1klfb2kxkezksv9t.svg","/de-de/the-source/",{"text":363,"config":364},"Abonnieren",{"href":365},"#subscribe",[367,371,374],{"text":368,"config":369},"Künstliche Intelligenz",{"href":370},"/de-de/the-source/ai/",{"text":98,"config":372},{"href":373},"/de-de/the-source/security/",{"text":375,"config":376},"Plattform und Infrastruktur",{"href":377},"/de-de/the-source/platform/","content:shared:de-de:the-source:navigation.yml","Navigation","shared/de-de/the-source/navigation.yml","shared/de-de/the-source/navigation",{"_path":383,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"title":384,"description":385,"submitMessage":386,"formData":387,"_id":390,"_type":29,"_source":31,"_file":391,"_stem":392,"_extension":34},"/shared/de-de/the-source/newsletter","The-Source-Newsletter","Bleibe mit Erkenntnissen für die Zukunft der Softwareentwicklung auf dem Laufenden.","Du hast dich erfolgreich für den Newsletter von The Source angemeldet.",{"config":388},{"formId":389,"formName":281,"hideRequiredLabel":330},28465,"content:shared:de-de:the-source:newsletter.yml","shared/de-de/the-source/newsletter.yml","shared/de-de/the-source/newsletter",{"_path":4,"_dir":5,"_draft":6,"_partial":6,"_locale":7,"config":394,"seo":395,"content":396,"type":26,"category":5,"slug":27,"_id":28,"_type":29,"title":30,"_source":31,"_file":32,"_stem":33,"_extension":34},{"layout":9,"template":10,"author":11,"featured":6,"sourceCTA":12},{"title":14,"description":15,"ogImage":16},{"title":14,"date":18,"description":19,"timeToRead":20,"heroImage":16,"keyTakeaways":397,"articleBody":25},[22,23,24],{"categoryNames":399},{"ai":368,"platform":375,"security":98},{"_path":401,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"config":402,"seo":403,"content":406,"type":421,"slug":5,"_id":422,"_type":29,"title":7,"_source":31,"_file":423,"_stem":424,"_extension":34},"/de-de/the-source/security",{"layout":9},{"title":98,"description":404,"ogImage":7,"config":405},"Erfahre, wie Unternehmen sicherstellen können, dass sie bei sich entwickelnden Sicherheitsbedrohungen und Compliance-Anforderungen immer auf dem neuesten Stand sind.",{"ignoreDescriptionCharLimit":330},[407,413],{"componentName":408,"componentContent":409},"TheSourceCategoryHero",{"title":98,"description":404,"image":410},{"config":411},{"src":412},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463273/aplkxrvwpii26xao5yhi.png",{"componentName":414,"componentContent":415},"TheSourceCategoryMainSection",{"config":416},{"sourceCTAs":417},[418,419,420],"source-lp-guide-to-dynamic-sboms","source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain","application-security-in-the-digital-age","category","content:de-de:the-source:security:index.yml","de-de/the-source/security/index.yml","de-de/the-source/security/index",{"_path":426,"_dir":427,"_draft":6,"_partial":6,"_locale":7,"config":428,"title":429,"description":430,"link":431,"_id":437,"_type":29,"_source":31,"_file":438,"_stem":439,"_extension":34},"/shared/de-de/the-source/source-lp-ctas/source-lp-ai-guide-for-enterprise-leaders-building-the-right-approach","source-lp-ctas",{"slug":12},"Baue den richtigen KI-Ansatz für deine Software-Innovationsstrategie auf","Generative KI-Tools sind gekommen, um zu bleiben. Unternehmen im Bereich des Software Engineering, die Top-Talente finden und binden möchten, müssen KI im Unternehmen einführen, um wettbewerbsfähig zu bleiben. Kontinuierliche Weiterbildung, Einführung und Support sind unerlässlich, um das Potenzial der KI sicher, geschützt und verantwortungsvoll nutzen zu können. Lade unseren Leitfaden für Führungskräfte herunter, um deine C-Suite, die Unternehmensführung und deine Entwicklungsteams darauf vorzubereiten, was KI jetzt schon kann und in Zukunft können wird, um die Softwareentwicklung zu beschleunigen.",{"text":432,"config":433},"Leitfaden lesen",{"href":434,"dataGaName":435,"dataGaLocation":436},"/the-source/ai/ai-guide-for-enterprise-leaders-building-the-right-approach/","AI Guide For Enterprise Leaders: Building the Right Approach","thesource","content:shared:de-de:the-source:source-lp-ctas:source-lp-ai-guide-for-enterprise-leaders-building-the-right-approach.yml","shared/de-de/the-source/source-lp-ctas/source-lp-ai-guide-for-enterprise-leaders-building-the-right-approach.yml","shared/de-de/the-source/source-lp-ctas/source-lp-ai-guide-for-enterprise-leaders-building-the-right-approach",{"_path":401,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"config":441,"seo":442,"content":444,"type":421,"slug":5,"_id":422,"_type":29,"title":7,"_source":31,"_file":423,"_stem":424,"_extension":34},{"layout":9},{"title":98,"description":404,"ogImage":7,"config":443},{"ignoreDescriptionCharLimit":330},[445,449],{"componentName":408,"componentContent":446},{"title":98,"description":404,"image":447},{"config":448},{"src":412},{"componentName":414,"componentContent":450},{"config":451},{"sourceCTAs":452},[418,419,420],[454,467,478],{"_path":455,"_dir":427,"_draft":6,"_partial":6,"_locale":7,"config":456,"title":457,"description":458,"link":459,"_id":464,"_type":29,"_source":31,"_file":465,"_stem":466,"_extension":34},"/shared/de-de/the-source/source-lp-ctas/application-security-in-the-digital-age",{"slug":420},"Anwendungssicherheit im digitalen Zeitalter","Lies dir die [Ergebnisse unserer Umfrage unter mehr als 5.000 DevSecOps-Expert(inn)en aus der ganzen Welt](https://about.gitlab.com/de-de/developer-survey/2024/security-compliance/) durch und erfahre, wie Unternehmen mit zunehmenden Angriffsflächen und sich ändernden Einstellungen zu Sicherheit und KI zu kämpfen haben.",{"text":460,"config":461},"Bericht lesen",{"href":462,"dataGaName":463,"dataGaLocation":436},"/de-de/developer-survey/2024/security-compliance/","Application Security in the Digital Age","content:shared:de-de:the-source:source-lp-ctas:application-security-in-the-digital-age.yml","shared/de-de/the-source/source-lp-ctas/application-security-in-the-digital-age.yml","shared/de-de/the-source/source-lp-ctas/application-security-in-the-digital-age",{"_path":468,"_dir":427,"_draft":6,"_partial":6,"_locale":7,"config":469,"title":470,"link":471,"_id":475,"_type":29,"_source":31,"_file":476,"_stem":477,"_extension":34},"/shared/de-de/the-source/source-lp-ctas/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain",{"slug":419},"A Field Guide to Threat Vectors in the Software Supply Chain (nur in englischer Sprache verfügbar)",{"config":472},{"href":473,"dataGaName":474,"dataGaLocation":436},"/the-source/security/field-guide-to-threat-vectors-in-the-software-supply-chain/","A field guide to threat vectors in the software supply chain","content:shared:de-de:the-source:source-lp-ctas:source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain.yml","shared/de-de/the-source/source-lp-ctas/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain.yml","shared/de-de/the-source/source-lp-ctas/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain",{"_path":479,"_dir":427,"_draft":6,"_partial":6,"_locale":7,"config":480,"title":481,"description":482,"link":483,"_id":488,"_type":29,"_source":31,"_file":489,"_stem":490,"_extension":34},"/shared/de-de/the-source/source-lp-ctas/source-lp-guide-to-dynamic-sboms",{"slug":418},"GitLab-Leitfaden für dynamische SBOMs: Ein integraler Bestandteil der modernen Softwareentwicklung","Erfahre, wie du mit einer Software-Stückliste (SBOM) die Sichtbarkeit von bisher unerkannten organisatorischen Risiken verbesserst.",{"text":484,"config":485},"Jetzt den Leitfaden lesen",{"href":486,"dataGaName":487,"dataGaLocation":436},"/the-source/security/guide-to-dynamic-sboms/","Guide to Dynamic SBOMs","content:shared:de-de:the-source:source-lp-ctas:source-lp-guide-to-dynamic-sboms.yml","shared/de-de/the-source/source-lp-ctas/source-lp-guide-to-dynamic-sboms.yml","shared/de-de/the-source/source-lp-ctas/source-lp-guide-to-dynamic-sboms",[492,515,531,547,563,584,604,620,638,658,675,696,712,730,747,765,784,802,821,842,862,878,894,912,930,949,965,983,999,1018],{"_path":493,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":495,"seo":496,"content":498,"type":510,"slug":511,"_id":512,"_type":29,"title":497,"_source":31,"_file":513,"_stem":514,"_extension":34},"/de-de/the-source/authors/amanda-rueda","authors",{"layout":9},{"title":497},"Amanda Rueda",[499,508],{"componentName":500,"componentContent":501},"TheSourceAuthorHero",{"config":502,"name":497,"headshot":505},{"gitlabHandle":503,"linkedInProfileUrl":504},"amandarueda","https://www.linkedin.com/in/amandamrueda/",{"altText":497,"config":506},{"src":507},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463383/osecw1pzbxvb7fhqhiky.png",{"componentName":509},"TheSourceArticlesList","author","amanda-rueda","content:de-de:the-source:authors:amanda-rueda.yml","de-de/the-source/authors/amanda-rueda.yml","de-de/the-source/authors/amanda-rueda",{"_path":516,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":517,"seo":518,"content":520,"type":510,"slug":527,"_id":528,"_type":29,"title":519,"_source":31,"_file":529,"_stem":530,"_extension":34},"/de-de/the-source/authors/andre-michael-braun",{"layout":9},{"title":519},"Andre Michael Braun",[521,526],{"componentName":500,"componentContent":522},{"name":519,"headshot":523},{"altText":519,"config":524},{"src":525},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463336/yl27k7wdlnkzsizwknn1.jpg",{"componentName":509},"andre-michael-braun","content:de-de:the-source:authors:andre-michael-braun.yml","de-de/the-source/authors/andre-michael-braun.yml","de-de/the-source/authors/andre-michael-braun",{"_path":532,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":533,"seo":534,"content":536,"type":510,"slug":543,"_id":544,"_type":29,"title":535,"_source":31,"_file":545,"_stem":546,"_extension":34},"/de-de/the-source/authors/andrew-haschka",{"layout":9},{"title":535},"Andrew Haschka",[537,542],{"componentName":500,"componentContent":538},{"name":535,"headshot":539},{"altText":535,"config":540},{"src":541},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463349/z1qnc4uxmqgg3hnm3da4.png",{"componentName":509},"andrew-haschka","content:de-de:the-source:authors:andrew-haschka.yml","de-de/the-source/authors/andrew-haschka.yml","de-de/the-source/authors/andrew-haschka",{"_path":548,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":549,"seo":550,"content":552,"type":510,"slug":559,"_id":560,"_type":29,"title":551,"_source":31,"_file":561,"_stem":562,"_extension":34},"/de-de/the-source/authors/ayoub-fandi",{"layout":9},{"title":551},"Ayoub Fandi",[553,558],{"componentName":500,"componentContent":554},{"name":551,"headshot":555},{"altText":551,"config":556},{"src":557},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463329/wyp554loeyoibx3ozren.jpg",{"componentName":509},"ayoub-fandi","content:de-de:the-source:authors:ayoub-fandi.yml","de-de/the-source/authors/ayoub-fandi.yml","de-de/the-source/authors/ayoub-fandi",{"_path":564,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":565,"seo":566,"content":568,"type":510,"slug":580,"_id":581,"_type":29,"title":567,"_source":31,"_file":582,"_stem":583,"_extension":34},"/de-de/the-source/authors/brian-wald",{"layout":9},{"title":567},"Brian Wald",[569,579],{"componentName":500,"componentContent":570},{"config":571,"name":567,"role":574,"bio":575,"headshot":576},{"gitlabHandle":572,"linkedInProfileUrl":573},"brianwald","https://www.linkedin.com/in/brianwald/","Head of Global Field CTO org","Brian Wald ist Head of Global Field CTO Org bei GitLab. Er leitet ein dynamisches Team von Field CTOs, das sich der Transformation von Softwareentwicklungspraktiken für Unternehmen widmet.",{"altText":567,"config":577},{"src":578},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463417/fugpbux9miqbdx3wewtu.jpg",{"componentName":509},"brian-wald","content:de-de:the-source:authors:brian-wald.yml","de-de/the-source/authors/brian-wald.yml","de-de/the-source/authors/brian-wald",{"_path":585,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":586,"seo":587,"content":589,"type":510,"slug":600,"_id":601,"_type":29,"title":588,"_source":31,"_file":602,"_stem":603,"_extension":34},"/de-de/the-source/authors/bryan-ross",{"layout":9},{"title":588},"Bryan Ross",[590,599],{"componentName":500,"componentContent":591},{"config":592,"name":588,"headshot":596},{"gitlabHandle":593,"twitterXProfileUrl":594,"linkedInProfileUrl":595},"bryanrossuk","https://twitter.com/bryanrossuk","https://www.linkedin.com/in/bryanross",{"altText":588,"config":597},{"src":598},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463324/mvdyvskii4hltdrgqxom.jpg",{"componentName":509},"bryan-ross","content:de-de:the-source:authors:bryan-ross.yml","de-de/the-source/authors/bryan-ross.yml","de-de/the-source/authors/bryan-ross",{"_path":605,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":606,"seo":607,"content":609,"type":510,"slug":616,"_id":617,"_type":29,"title":608,"_source":31,"_file":618,"_stem":619,"_extension":34},"/de-de/the-source/authors/chandler-gibbons",{"layout":9},{"title":608},"Chandler Gibbons",[610,615],{"componentName":500,"componentContent":611},{"name":608,"headshot":612},{"altText":608,"config":613},{"src":614},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463362/o7g9fqtqtjvegfwniuxh.jpg",{"componentName":509},"chandler-gibbons","content:de-de:the-source:authors:chandler-gibbons.yml","de-de/the-source/authors/chandler-gibbons.yml","de-de/the-source/authors/chandler-gibbons",{"_path":621,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":622,"seo":623,"content":625,"type":510,"slug":634,"_id":635,"_type":29,"title":624,"_source":31,"_file":636,"_stem":637,"_extension":34},"/de-de/the-source/authors/dave-steer",{"layout":9},{"title":624},"Dave Steer",[626,633],{"componentName":500,"componentContent":627},{"config":628,"name":624,"headshot":630},{"gitlabHandle":629},"dsteer",{"altText":624,"config":631},{"src":632},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463457/zbtapdkglu3yb9suaq7w.png",{"componentName":509},"dave-steer","content:de-de:the-source:authors:dave-steer.yml","de-de/the-source/authors/dave-steer.yml","de-de/the-source/authors/dave-steer",{"_path":639,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":640,"seo":641,"content":643,"type":510,"slug":653,"_id":654,"_type":29,"title":655,"_source":31,"_file":656,"_stem":657,"_extension":34},"/de-de/the-source/authors/ddesanto",{"layout":9},{"title":642},"David DeSanto",[644,652],{"componentName":500,"componentContent":645},{"config":646,"name":642,"headshot":649},{"gitlabHandle":647,"linkedInProfileUrl":648},"david","https://www.linkedin.com/in/ddesanto/",{"altText":642,"config":650},{"src":651},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463446/bgnljs84zcsxj0t6nvix.png",{"componentName":509},"ddesanto","content:de-de:the-source:authors:ddesanto.yml","Ddesanto","de-de/the-source/authors/ddesanto.yml","de-de/the-source/authors/ddesanto",{"_path":659,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":660,"seo":661,"content":663,"type":510,"slug":670,"_id":671,"_type":29,"title":672,"_source":31,"_file":673,"_stem":674,"_extension":34},"/de-de/the-source/authors/derek-debellis",{"layout":9},{"title":662},"Derek DeBellis",[664,669],{"componentName":500,"componentContent":665},{"name":662,"headshot":666},{"altText":662,"config":667},{"src":668},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463385/sbnjwfaguszi5g2smzr7.png",{"componentName":509},"derek-debellis","content:de-de:the-source:authors:derek-debellis.yml","Derek Debellis","de-de/the-source/authors/derek-debellis.yml","de-de/the-source/authors/derek-debellis",{"_path":676,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":677,"seo":678,"content":680,"type":510,"slug":692,"_id":693,"_type":29,"title":679,"_source":31,"_file":694,"_stem":695,"_extension":34},"/de-de/the-source/authors/emilio-salvador",{"layout":9},{"title":679},"Emilio Salvador",[681,691],{"componentName":500,"componentContent":682},{"config":683,"name":679,"role":686,"bio":687,"headshot":688},{"gitlabHandle":684,"linkedInProfileUrl":685},"esalvadorp","https://www.linkedin.com/in/emiliosp/","Vice President, Strategy and Developer Relations","Emilio Salvador ist Vice President of Strategy and Developer Relations bei GitLab. Emilio ist Technologieexperte und verfügt über mehr als 20 Jahre Erfahrung. Er war bei Amazon und Microsoft tätig und leitete zuletzt bei Google die Strategie und den Betrieb des Teams Developer Advocacy and Experience. Er hat einen MBA-Abschluss der MIT Sloan School of Management.",{"altText":679,"config":689},{"src":690},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463402/g0snp3uisjm4tj3pkqcw.jpg",{"componentName":509},"emilio-salvador","content:de-de:the-source:authors:emilio-salvador.yml","de-de/the-source/authors/emilio-salvador.yml","de-de/the-source/authors/emilio-salvador",{"_path":697,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":698,"seo":699,"content":701,"type":510,"slug":708,"_id":709,"_type":29,"title":700,"_source":31,"_file":710,"_stem":711,"_extension":34},"/de-de/the-source/authors/erika-feldman",{"layout":9},{"title":700},"Erika Feldman",[702,707],{"componentName":500,"componentContent":703},{"name":700,"headshot":704},{"altText":700,"config":705},{"src":706},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463354/d9quqvz7d2ayjwif7vdn.png",{"componentName":509},"erika-feldman","content:de-de:the-source:authors:erika-feldman.yml","de-de/the-source/authors/erika-feldman.yml","de-de/the-source/authors/erika-feldman",{"_path":713,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":714,"seo":715,"content":717,"type":510,"slug":726,"_id":727,"_type":29,"title":716,"_source":31,"_file":728,"_stem":729,"_extension":34},"/de-de/the-source/authors/george-kichukov",{"layout":9},{"title":716},"George Kichukov",[718,725],{"componentName":500,"componentContent":719},{"config":720,"name":716,"headshot":722},{"gitlabHandle":721},"gkichukov",{"altText":716,"config":723},{"src":724},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463366/dk2knfancgsxocjkmyoa.jpg",{"componentName":509},"george-kichukov","content:de-de:the-source:authors:george-kichukov.yml","de-de/the-source/authors/george-kichukov.yml","de-de/the-source/authors/george-kichukov",{"_path":731,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":732,"seo":733,"content":735,"type":510,"slug":742,"_id":743,"_type":29,"title":744,"_source":31,"_file":745,"_stem":746,"_extension":34},"/de-de/the-source/authors/gitlab",{"layout":9},{"title":734},"GitLab",[736,741],{"componentName":500,"componentContent":737},{"name":734,"headshot":738},{"altText":734,"config":739},{"src":740},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463461/ts7io0hgpdyqylbzfire.png",{"componentName":509},"gitlab","content:de-de:the-source:authors:gitlab.yml","Gitlab","de-de/the-source/authors/gitlab.yml","de-de/the-source/authors/gitlab",{"_path":748,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":749,"seo":750,"content":752,"type":510,"slug":761,"_id":762,"_type":29,"title":751,"_source":31,"_file":763,"_stem":764,"_extension":34},"/de-de/the-source/authors/grant-hickman",{"layout":9},{"title":751},"Grant Hickman",[753,760],{"componentName":500,"componentContent":754},{"config":755,"name":751,"headshot":757},{"gitlabHandle":756},"g.hickman",{"altText":751,"config":758},{"src":759},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463463/f3uqwtugqotyhwutz5gu.png",{"componentName":509},"grant-hickman","content:de-de:the-source:authors:grant-hickman.yml","de-de/the-source/authors/grant-hickman.yml","de-de/the-source/authors/grant-hickman",{"_path":766,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":767,"seo":768,"content":770,"type":510,"slug":780,"_id":781,"_type":29,"title":769,"_source":31,"_file":782,"_stem":783,"_extension":34},"/de-de/the-source/authors/haim-snir",{"layout":9},{"title":769},"Haim Snir",[771,779],{"componentName":500,"componentContent":772},{"config":773,"name":769,"headshot":776},{"gitlabHandle":774,"linkedInProfileUrl":775},"hsnir1","https://www.linkedin.com/in/haimsnir/",{"altText":769,"config":777},{"src":778},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463395/nubmshvaq8wpomopllni.png",{"componentName":509},"haim-snir","content:de-de:the-source:authors:haim-snir.yml","de-de/the-source/authors/haim-snir.yml","de-de/the-source/authors/haim-snir",{"_path":785,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":786,"seo":787,"content":789,"type":510,"slug":793,"_id":798,"_type":29,"title":799,"_source":31,"_file":800,"_stem":801,"_extension":34},"/de-de/the-source/authors/iganbaruch",{"layout":9},{"title":788},"Itzik Gan Baruch",[790,797],{"componentName":500,"componentContent":791},{"config":792,"name":788,"headshot":794},{"gitlabHandle":793},"iganbaruch",{"altText":788,"config":795},{"src":796},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463443/vibb2fkc0ojni2d1eqde.png",{"componentName":509},"content:de-de:the-source:authors:iganbaruch.yml","Iganbaruch","de-de/the-source/authors/iganbaruch.yml","de-de/the-source/authors/iganbaruch",{"_path":803,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":804,"seo":805,"content":807,"type":510,"slug":816,"_id":817,"_type":29,"title":818,"_source":31,"_file":819,"_stem":820,"_extension":34},"/de-de/the-source/authors/jlongo",{"layout":9},{"title":806},"Joseph Longo",[808,815],{"componentName":500,"componentContent":809},{"config":810,"name":806,"headshot":812},{"gitlabHandle":811},"jlongo_gitlab",{"altText":806,"config":813},{"src":814},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463434/uoxaknpmoposbbgzqji8.png",{"componentName":509},"jlongo","content:de-de:the-source:authors:jlongo.yml","Jlongo","de-de/the-source/authors/jlongo.yml","de-de/the-source/authors/jlongo",{"_path":822,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":823,"seo":824,"content":826,"type":510,"slug":838,"_id":839,"_type":29,"title":825,"_source":31,"_file":840,"_stem":841,"_extension":34},"/de-de/the-source/authors/joel-krooswyk",{"layout":9},{"title":825},"Joel Krooswyk",[827,837],{"componentName":500,"componentContent":828},{"config":829,"name":825,"role":832,"bio":833,"headshot":834},{"gitlabHandle":830,"linkedInProfileUrl":831},"jkrooswyk","https://www.linkedin.com/in/joelrkrooswyk/","Federal CTO","Joel Krooswyk ist Federal CTO bei GitLab. Joel ist seit 2017 aktiv am Wachstum von GitLab beteiligt. Seine 25-jährige Führungserfahrung hat er nicht nur im öffentlichen Sektor der USA gesammelt, sondern auch in kleinen, mittleren und großen Unternehmen auf der ganzen Welt. Joel verbindet eine umfassende Expertise auf dem Gebiet der politischen Strategie mit langjähriger Erfahrung in den Bereichen Technologie, Softwareentwicklung, KI und Cybersicherheit. Seine Expertise wird regelmäßig sowohl von der Industrie als auch Behörden bei Fragen der Politik für Kommentare und Reaktionen in Anspruch genommen.",{"altText":825,"config":835},{"src":836},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463423/mkmdhuxsjggfvokdmdv7.jpg",{"componentName":509},"joel-krooswyk","content:de-de:the-source:authors:joel-krooswyk.yml","de-de/the-source/authors/joel-krooswyk.yml","de-de/the-source/authors/joel-krooswyk",{"_path":843,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":844,"seo":845,"content":847,"type":510,"slug":11,"_id":859,"_type":29,"title":846,"_source":31,"_file":860,"_stem":861,"_extension":34},"/de-de/the-source/authors/josh-lemos",{"layout":9},{"title":846},"Josh Lemos",[848,858],{"componentName":500,"componentContent":849},{"config":850,"name":846,"role":853,"bio":854,"headshot":855},{"gitlabHandle":851,"linkedInProfileUrl":852},"joshlemos","https://www.linkedin.com/in/joshlemos/","Chief Information Security Officer","Josh Lemos ist Chief Information Security Officer bei GitLab Inc. und bringt 20 Jahre Erfahrung in der Leitung von Informationssicherheitsteams in seine Rolle ein. Er ist für die Erstellung und Aufrechterhaltung der Unternehmensvision, -strategie und -programme verantwortlich, um sicherzustellen, dass Informationsressourcen und Technologien angemessen geschützt sind, die Gitlab-DevSecOps-Plattform zu stärken und den Kund(inn)en ein Höchstmaß an Sicherheit zu bieten.",{"altText":846,"config":856},{"src":857},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463405/f4rqtiecakrekvxfhqar.jpg",{"componentName":509},"content:de-de:the-source:authors:josh-lemos.yml","de-de/the-source/authors/josh-lemos.yml","de-de/the-source/authors/josh-lemos",{"_path":863,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":864,"seo":865,"content":867,"type":510,"slug":874,"_id":875,"_type":29,"title":866,"_source":31,"_file":876,"_stem":877,"_extension":34},"/de-de/the-source/authors/julie-griffin",{"layout":9},{"title":866},"Julie Griffin",[868,873],{"componentName":500,"componentContent":869},{"name":866,"headshot":870},{"altText":866,"config":871},{"src":872},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463371/hqkbr3uk8hw2de7tltn4.webp",{"componentName":509},"julie-griffin","content:de-de:the-source:authors:julie-griffin.yml","de-de/the-source/authors/julie-griffin.yml","de-de/the-source/authors/julie-griffin",{"_path":879,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":880,"seo":881,"content":883,"type":510,"slug":890,"_id":891,"_type":29,"title":882,"_source":31,"_file":892,"_stem":893,"_extension":34},"/de-de/the-source/authors/kristina-weis",{"layout":9},{"title":882},"Kristina Weis",[884,889],{"componentName":500,"componentContent":885},{"name":882,"headshot":886},{"altText":882,"config":887},{"src":888},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463469/eoolq6n6bs0zb8gmf0js.webp",{"componentName":509},"kristina-weis","content:de-de:the-source:authors:kristina-weis.yml","de-de/the-source/authors/kristina-weis.yml","de-de/the-source/authors/kristina-weis",{"_path":895,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":896,"seo":897,"content":899,"type":510,"slug":908,"_id":909,"_type":29,"title":898,"_source":31,"_file":910,"_stem":911,"_extension":34},"/de-de/the-source/authors/lee-faus",{"layout":9},{"title":898},"Lee Faus",[900,907],{"componentName":500,"componentContent":901},{"config":902,"name":898,"headshot":904},{"gitlabHandle":903},"lfaus",{"altText":898,"config":905},{"src":906},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463398/vivhlomglvnstamj54bo.jpg",{"componentName":509},"lee-faus","content:de-de:the-source:authors:lee-faus.yml","de-de/the-source/authors/lee-faus.yml","de-de/the-source/authors/lee-faus",{"_path":913,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":914,"seo":915,"content":917,"type":510,"slug":921,"_id":926,"_type":29,"title":927,"_source":31,"_file":928,"_stem":929,"_extension":34},"/de-de/the-source/authors/ncregan",{"layout":9},{"title":916},"Niall Cregan",[918,925],{"componentName":500,"componentContent":919},{"config":920,"name":916,"headshot":922},{"gitlabHandle":921},"ncregan",{"altText":916,"config":923},{"src":924},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463431/yrtwodocb4cu3j7lkhyo.png",{"componentName":509},"content:de-de:the-source:authors:ncregan.yml","Ncregan","de-de/the-source/authors/ncregan.yml","de-de/the-source/authors/ncregan",{"_path":931,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":932,"seo":933,"content":935,"type":510,"slug":944,"_id":945,"_type":29,"title":946,"_source":31,"_file":947,"_stem":948,"_extension":34},"/de-de/the-source/authors/rschulman",{"layout":9},{"title":934},"Robin Schulman",[936,943],{"componentName":500,"componentContent":937},{"config":938,"name":934,"headshot":940},{"gitlabHandle":939},"robin",{"altText":934,"config":941},{"src":942},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463437/u2xfbudw1f8hhnkrgaoy.webp",{"componentName":509},"rschulman","content:de-de:the-source:authors:rschulman.yml","Rschulman","de-de/the-source/authors/rschulman.yml","de-de/the-source/authors/rschulman",{"_path":950,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":951,"seo":952,"content":954,"type":510,"slug":961,"_id":962,"_type":29,"title":953,"_source":31,"_file":963,"_stem":964,"_extension":34},"/de-de/the-source/authors/sabrina-farmer",{"layout":9},{"title":953},"Sabrina Farmer",[955,960],{"componentName":500,"componentContent":956},{"name":953,"headshot":957},{"altText":953,"config":958},{"src":959},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463377/udmzbjjr5xrcrffdlphx.webp",{"componentName":509},"sabrina-farmer","content:de-de:the-source:authors:sabrina-farmer.yml","de-de/the-source/authors/sabrina-farmer.yml","de-de/the-source/authors/sabrina-farmer",{"_path":966,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":967,"seo":968,"content":970,"type":510,"slug":979,"_id":980,"_type":29,"title":969,"_source":31,"_file":981,"_stem":982,"_extension":34},"/de-de/the-source/authors/sandra-gittlen",{"layout":9},{"title":969},"Sandra Gittlen",[971,978],{"componentName":500,"componentContent":972},{"config":973,"name":969,"headshot":975},{"gitlabHandle":974},"sgittlen",{"altText":969,"config":976},{"src":977},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463466/r7ckb9h2zr4c2rsz3zlm.png",{"componentName":509},"sandra-gittlen","content:de-de:the-source:authors:sandra-gittlen.yml","de-de/the-source/authors/sandra-gittlen.yml","de-de/the-source/authors/sandra-gittlen",{"_path":984,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":985,"seo":986,"content":988,"type":510,"slug":995,"_id":996,"_type":29,"title":987,"_source":31,"_file":997,"_stem":998,"_extension":34},"/de-de/the-source/authors/sharon-gaudin",{"layout":9},{"title":987},"Sharon Gaudin",[989,994],{"componentName":500,"componentContent":990},{"name":987,"headshot":991},{"altText":987,"config":992},{"src":993},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463475/h6j4nnvykzyfzgvl7txb.webp",{"componentName":509},"sharon-gaudin","content:de-de:the-source:authors:sharon-gaudin.yml","de-de/the-source/authors/sharon-gaudin.yml","de-de/the-source/authors/sharon-gaudin",{"_path":1000,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":1001,"seo":1002,"content":1004,"type":510,"slug":1014,"_id":1015,"_type":29,"title":1003,"_source":31,"_file":1016,"_stem":1017,"_extension":34},"/de-de/the-source/authors/stephen-walters",{"layout":9},{"title":1003},"Stephen Walters",[1005,1013],{"componentName":500,"componentContent":1006},{"config":1007,"name":1003,"headshot":1010},{"gitlabHandle":1008,"linkedInProfileUrl":1009},"swalters1","https://www.linkedin.com/in/1stephenwalters/",{"altText":1003,"config":1011},{"src":1012},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463392/g6ktk5qb4vcqc9wqjlf9.jpg",{"componentName":509},"stephen-walters","content:de-de:the-source:authors:stephen-walters.yml","de-de/the-source/authors/stephen-walters.yml","de-de/the-source/authors/stephen-walters",{"_path":1019,"_dir":494,"_draft":6,"_partial":6,"_locale":7,"config":1020,"seo":1021,"content":1023,"type":510,"slug":1035,"_id":1036,"_type":29,"title":1037,"_source":31,"_file":1038,"_stem":1039,"_extension":34},"/de-de/the-source/authors/taylor-mccaslin",{"layout":9},{"title":1022},"Taylor McCaslin",[1024,1034],{"componentName":500,"componentContent":1025},{"config":1026,"name":1022,"role":1029,"bio":1030,"headshot":1031},{"gitlabHandle":1027,"linkedInProfileUrl":1028},"tmccaslin","https://www.linkedin.com/in/taylormccaslin/","Group Manager, Product – Data Science","Taylor McCaslin ist Product Lead für KI/ML bei GitLab und leitet dort das Team der Produktmanager(innen), die die Arbeitsgruppen AI Powered und ModelOps betreuen, und legt die Vision und die Richtung fest, wie Benutzer(innen) von GitLab im Rahmen ihres DevOps-Programms von Data Science profitieren können. Bevor er zu GitLab kam, war er bei Indeed, Duo Security und WP Engine tätig.",{"altText":1022,"config":1032},{"src":1033},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463427/trfasilaeasosxfcxmsm.jpg",{"componentName":509},"taylor-mccaslin","content:de-de:the-source:authors:taylor-mccaslin.yml","Taylor Mccaslin","de-de/the-source/authors/taylor-mccaslin.yml","de-de/the-source/authors/taylor-mccaslin",1761814409937]