[{"data":1,"prerenderedAt":1033},["ShallowReactive",2],{"/fr-fr/the-source/security/security-its-more-than-culture-addressing-the-root-cause-of-common-security":3,"footer-fr-fr":37,"the-source-banner-fr-fr":348,"the-source-navigation-fr-fr":360,"the-source-newsletter-fr-fr":387,"footer-source-/fr-fr/the-source/security/security-its-more-than-culture-addressing-the-root-cause-of-common-security/":398,"article-site-categories-fr-fr":403,"security-its-more-than-culture-addressing-the-root-cause-of-common-security-article-hero-category-fr-fr":405,"security-its-more-than-culture-addressing-the-root-cause-of-common-security-the-source-source-cta-fr-fr":428,"security-its-more-than-culture-addressing-the-root-cause-of-common-security-category-fr-fr":443,"security-its-more-than-culture-addressing-the-root-cause-of-common-security-the-source-resources-fr-fr":455,"security-its-more-than-culture-addressing-the-root-cause-of-common-security-article-hero-author-fr-fr":484},{"_path":4,"_dir":5,"_draft":6,"_partial":6,"_locale":7,"config":8,"seo":14,"content":18,"type":28,"category":5,"slug":29,"_id":30,"_type":31,"title":32,"_source":33,"_file":34,"_stem":35,"_extension":36},"/fr-fr/the-source/security/security-its-more-than-culture-addressing-the-root-cause-of-common-security","security",false,"",{"layout":9,"template":10,"author":11,"featured":12,"sourceCTA":13},"the-source","TheSourceArticle","josh-lemos",true,"application-security-in-the-digital-age",{"title":15,"description":16,"ogImage":17},"Sécurité de l'information : comment résoudre les frictions ","Les défis de sécurité génèrent des frictions qui freinent les équipes, mais la gestion de la pile technologique et des vulnérabilités est tout aussi cruciale.","https://res.cloudinary.com/about-gitlab-com/image/upload/v1751464489/mragusmxl1wz8ozdaoml.png",{"title":19,"date":20,"description":21,"timeToRead":22,"heroImage":17,"keyTakeaways":23,"articleBody":27},"Identifier et remédier aux frustrations les plus courantes en matière de sécurité de l'information","2024-10-29","Le domaine de la sécurité suscite bien des frustrations, généralement considérées comme un problème culturel. Les dirigeants doivent porter leur attention sur d'autres enjeux, comme la complexité de la pile technologique et la gestion des vulnérabilités.","Lecture : 5 min",[24,25,26],"L'analyse des vulnérabilités avec authentification renforce la gestion des failles de sécurité. Elle peut toutefois détourner les équipes d'ingénierie vers des tâches non critiques, créant ainsi des tensions entre les équipes de sécurité et d'ingénierie.","Adopter une approche minimaliste pour le développement logiciel optimise la sécurité des applications, en réduisant les dépendances, diminuant le nombre de faux positifs et allégeant la charge de travail des développeurs.","L'adoption d'une approche « guidée », qui repose sur des design patterns testés et approuvés basés sur des cas d'utilisation reproductibles, peut faciliter le travail des équipes d'ingénierie tout en renforçant la sécurité.","Cette année, l'[enquête annuelle menée par GitLab auprès des professionnels DevSecOps](https://about.gitlab.com/fr-fr/developer-survey/) révèle plusieurs obstacles liés à la culture d'entreprise qui pourraient entraver l'alignement entre les équipes d'ingénierie et de sécurité. Une majorité (58 %) des professionnels de la sécurité interrogés déclarent qu'il leur est difficile de faire en sorte que le développement priorise la correction des vulnérabilités. Par ailleurs, 52 % estiment que leurs efforts pour résoudre rapidement ces failles de sécurité sont souvent ralentis par la bureaucratie interne. Parmi les frustrations liées à leur travail, ils citent notamment la difficulté à interpréter les résultats des analyses de sécurité, le nombre trop élevé de faux positifs et le fait que les tests sont effectués trop tardivement dans le cycle de développement logiciel.\n\nBien que l'approche [DevSecOps](/topics/devsecops/) promette une meilleure intégration entre l'ingénierie et la sécurité, ces frustrations et déséquilibres montrent que des défis subsistent. Ce constat reflète un problème plus large lié à la manière dont les entreprises perçoivent la sécurité, organisent la collaboration entre les équipes, et allouent du temps à cette priorité.\n\n## Améliorer la gestion du nombre toujours plus grand de vulnérabilités\n\nL'analyse des vulnérabilités met en évidence toutes les vulnérabilités potentielles. Cependant, la présence d'une vulnérabilité ou d'une exposition commune (CVE) dans un logiciel ne signifie pas nécessairement que celle-ci est accessible ou exploitable. Les équipes de sécurité et les développeurs doivent donc hiérarchiser et filtrer les résultats des rapports d'analyse, dont le nombre a augmenté de manière exponentielle au fil des ans avec l'adoption de l'analyse de vulnérabilité avec authentification.\n\nSi ce processus a renforcé l'efficacité des programmes de sécurité à bien des égards, il conduit toutefois les développeur à corriger sans arrêt des failles sans importance réelle. Lorsque les équipes perdent du temps à appliquer des correctifs qui ne résolvent pas une vulnérabilité exploitable, elles ne consacrent pas suffisamment de temps aux tâches plus critiques, telles que l'application de correctifs à des failles véritablement vulnérables et exploitables. Cette situation contribue largement à la divergence actuelle entre les priorités des équipes de sécurité et celles de l'ingénierie.\n\nLa question est donc de savoir comment les entreprises peuvent s'attaquer aux cause profondes de ces problèmes pour favoriser une meilleure intégration entre les équipes d'ingénierie et de sécurité. Voici trois approches pour éviter les frustrations les plus courantes en matière de sécurité, en ciblant directement la source du problème.\n\n### 1. Réduire les faux positifs et se concentrer sur des signaux pertinents, fiables et  exploitables\n\nLe nombre excessif de faux positifs constitue la deuxième source de frustration majeure pour les professionnels de sécurité, selon notre enquête. Bien qu’ils représentent un problème réel, ils révèlent souvent une gestion inefficace des vulnérabilités. \n\nSi une entreprise détecte de nombreux faux positifs, cela peut indiquer qu'elle n'a pas mis en place les mesures adéquates pour assurer la pertinence et la fiabilité de ses découvertes en matière de failles de sécurité. Pour améliorer l’efficacité, les entreprises doivent cibler leurs efforts de sécurité sur les vulnérabilités les plus critiques. Les solutions classiques de test statique de sécurité des applications (SAST) sont insuffisantes. Elles restent essentielles, mais elles perdent de leur utilité si leurs résultats sont mal contextualisés ou difficiles à gérer. Pour optimiser l'impact des tests SAST, il est crucial de les intégrer [de manière fluide avec les autres outils de sécurité et de développement, et de les rendre accessibles aux développeurs](https://about.gitlab.com/blog/oxeye-joins-gitlab-to-advance-application-security-capabilities/).\n\nLa plupart des outils d'analyse offrent une visibilité limitée, rendant plus difficile la compréhension des résultats. C'est dans ce domaine que [les fonctionnalités alimentées par l'IA peuvent s'avérer utiles pour expliquer les failles de sécurité](https://about.gitlab.com/fr-fr/the-source/ai/understand-and-resolve-vulnerabilities-with-ai-powered-gitlab-duo/).\n\n### 2. Réduire la complexité de la pile technologique et la surface d'attaque\n\nSe concentrer sur l'essentiel ne s'applique pas seulement aux tests de sécurité, mais en premier lieu à la façon dont les entreprises développent leurs logiciels.\n\nBien que l'IA promette de simplifier les processus de développement logiciel, [notre enquête montre que de nombreuses entreprises ont encore un long chemin à parcourir](https://about.gitlab.com/the-source/platform/3-surprising-findings-from-our-2024-global-devsecops-survey/). Les répondants utilisant l’IA étaient d’ailleurs plus enclins à vouloir consolider leurs outils que ceux qui ne l’utilisent pas, ce qui suggère que l’ajout de solutions ponctuelles intégrant divers modèles d’IA pourrait accroître la complexité au lieu de la réduire.\n\nCette complexité technologique contribue largement aux frustrations liées à la sécurité. Développer des systèmes logiciels complexes et multifonctionnels entraîne nécessairement un certain niveau de complexité. Cependant, les entreprises doivent prendre des mesures pour éviter la complexité qui résulte de décisions de conception loin d'être optimales, comme des dépendances redondantes ou un code difficile à maintenir. Une telle complexité accroît la surface d'attaque, augmente le nombre de résultats d'analyse de vulnérabilités à gérer, et alourdit les priorités des équipes de sécurité.\n\nPour limiter cette surcharge, il est essentiel de réduire le nombre d’outils et de logiciels utilisés, en intégrant uniquement ceux qui sont réellement nécessaires dans les codes bases. Cela permet de diminuer les dépendances inutiles, de renforcer la sécurité de la chaîne d’approvisionnement logicielle, de réduire les faux positifs générés par les scanners de vulnérabilités et d’alléger la charge de travail des développeurs en leur épargnant les résolutions de problèmes non critiques.\n\n### 3. Normaliser les procédures\n\nLa réalisation de tests de sécurité trop tard dans le cycle de vie du développement logiciel était également l'une des principales sources de frustration identifiées par les répondants à notre enquête. Les équipes peuvent se sentir frustrées lorsque la livraison de code est retardée à cause d'une vulnérabilité détectée tardivement. Mais très souvent, il n'était pas possible de détecter cette vulnérabilité plus tôt. Il est toutefois possible de mettre en place des composants de sécurité facilement déployables et réutilisables. Cela permet de limiter les variables et les vulnérabilités potentielles.\n\nEn adoptant une approche « guidée » fondée sur [des design patterns testés et approuvés basés sur des cas d'utilisation reproductibles](https://about.gitlab.com/the-source/platform/how-devops-and-platform-engineering-turbocharge-efficiency/), les équipes peuvent anticiper les risques. Cette méthode balisée est recommandée. Elle repose sur un ensemble d'outils, de processus et de composants bien structurés qui aide les équipes à créer des applications sécurisées plus efficacement. L'utilisation de GitOps pour la gestion des versions et le déploiement d’une infrastructure en tant que code, avec une architecture bien pensée et testée, capable de se déployer à grande échelle pour tous les types de charges de travail en est un exemple parfait. \n\nBien que l'adoption d'une procédure balisée risque de supprimer une certaine flexibilité, elle réduit finalement la charge opérationnelle et le nombre de retouches des équipes d'ingénierie, tout en renforçant la sécurité. La collaboration entre les équipes de sécurité et de développement est essentielle pour atteindre cet objectif. Les équipes de sécurité peuvent participer à la création de procédures structurées, tandis que les équipes d’ingénierie doivent contribuer à leur intégration et à leur mise à jour au sein du code base.\n\n## La sécurité, une pratique multidisciplinaire{class=\"no-anchor\"}\n\nLa sécurité évolue vers une pratique multidisciplinaire qui rapproche de plus en plus les équipes d'ingénierie et celles chargées de la sécurité. Avec l'adoption rapide de l'IA pour accélérer le développement logiciel (66 % des répondants à notre enquête publient désormais des logiciels deux fois plus rapidement que l'année précédente), les entreprises doivent impérativement mettre en place des systèmes et des frameworks qui optimisent la sécurité. Cela démontre la forte interconnexion entre développement et sécurité. Pour cela, il est essentiel de promouvoir une culture de collaboration. Les équipes de sécurité et d'ingénierie doivent travailler main dans la main pour repenser les bases du développement logiciel. Cela inclut l'optimisation des codes bases existants et la création de solutions évolutives orientées ingénierie, que les équipes techniques de l’entreprise peuvent adopter facilement.","article","security-its-more-than-culture-addressing-the-root-cause-of-common-security","content:fr-fr:the-source:security:security-its-more-than-culture-addressing-the-root-cause-of-common-security.yml","yaml","Security Its More Than Culture Addressing The Root Cause Of Common Security","content","fr-fr/the-source/security/security-its-more-than-culture-addressing-the-root-cause-of-common-security.yml","fr-fr/the-source/security/security-its-more-than-culture-addressing-the-root-cause-of-common-security","yml",{"_path":38,"_dir":39,"_draft":6,"_partial":6,"_locale":7,"data":40,"_id":344,"_type":31,"title":345,"_source":33,"_file":346,"_stem":347,"_extension":36},"/shared/fr-fr/main-footer","fr-fr",{"text":41,"source":42,"edit":48,"contribute":53,"config":58,"items":63,"minimal":335},"Git est une marque déposée de Software Freedom Conservancy et notre utilisation de « GitLab » est sous licence",{"text":43,"config":44},"Afficher le code source de la page",{"href":45,"dataGaName":46,"dataGaLocation":47},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/","page source","footer",{"text":49,"config":50},"Modifier cette page",{"href":51,"dataGaName":52,"dataGaLocation":47},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/content/","web ide",{"text":54,"config":55},"Veuillez contribuer",{"href":56,"dataGaName":57,"dataGaLocation":47},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/CONTRIBUTING.md/","please contribute",{"twitter":59,"facebook":60,"youtube":61,"linkedin":62},"https://twitter.com/gitlab","https://www.facebook.com/gitlab","https://www.youtube.com/channel/UCnMGQ8QHMAnVIsI3xJrihhg","https://www.linkedin.com/company/gitlab-com",[64,91,164,235,297],{"title":65,"links":66,"subMenu":72},"Plateforme",[67],{"text":68,"config":69},"Plateforme DevSecOps",{"href":70,"dataGaName":71,"dataGaLocation":47},"/fr-fr/platform/","devsecops platform",[73],{"title":74,"links":75},"Tarifs",[76,81,86],{"text":77,"config":78},"Voir les forfaits",{"href":79,"dataGaName":80,"dataGaLocation":47},"/fr-fr/pricing/","view plans",{"text":82,"config":83},"Pourquoi choisir GitLab Premium ?",{"href":84,"dataGaName":85,"dataGaLocation":47},"/fr-fr/pricing/premium/","why premium",{"text":87,"config":88},"Pourquoi choisir GitLab Ultimate ?",{"href":89,"dataGaName":90,"dataGaLocation":47},"/fr-fr/pricing/ultimate/","why ultimate",{"title":92,"links":93},"Solutions",[94,99,104,109,114,119,124,129,134,139,144,149,154,159],{"text":95,"config":96},"Transformation digitale",{"href":97,"dataGaName":98,"dataGaLocation":47},"/fr-fr/topics/digital-transformation/","digital transformation",{"text":100,"config":101},"Sécurité et conformité",{"href":102,"dataGaName":103,"dataGaLocation":47},"/fr-fr/solutions/application-security-testing/","Application security testing",{"text":105,"config":106},"Livraison de logiciels automatisée",{"href":107,"dataGaName":108,"dataGaLocation":47},"/fr-fr/solutions/delivery-automation/","automated software delivery",{"text":110,"config":111},"Développement agile",{"href":112,"dataGaName":113,"dataGaLocation":47},"/fr-fr/solutions/agile-delivery/","agile delivery",{"text":115,"config":116},"Transformation cloud",{"href":117,"dataGaName":118,"dataGaLocation":47},"/fr-fr/topics/cloud-native/","cloud transformation",{"text":120,"config":121},"SCM",{"href":122,"dataGaName":123,"dataGaLocation":47},"/fr-fr/solutions/source-code-management/","source code management",{"text":125,"config":126},"CI/CD",{"href":127,"dataGaName":128,"dataGaLocation":47},"/fr-fr/solutions/continuous-integration/","continuous integration & delivery",{"text":130,"config":131},"Gestion de la chaîne de valeur",{"href":132,"dataGaName":133,"dataGaLocation":47},"/fr-fr/solutions/value-stream-management/","value stream management",{"text":135,"config":136},"GitOps",{"href":137,"dataGaName":138,"dataGaLocation":47},"/fr-fr/solutions/gitops/","gitops",{"text":140,"config":141},"Entreprises",{"href":142,"dataGaName":143,"dataGaLocation":47},"/fr-fr/enterprise/","enterprise",{"text":145,"config":146},"PME",{"href":147,"dataGaName":148,"dataGaLocation":47},"/fr-fr/small-business/","small business",{"text":150,"config":151},"Secteur public",{"href":152,"dataGaName":153,"dataGaLocation":47},"/fr-fr/solutions/public-sector/","public sector",{"text":155,"config":156},"Formation",{"href":157,"dataGaName":158,"dataGaLocation":47},"/fr-fr/solutions/education/","education",{"text":160,"config":161},"Services financiers",{"href":162,"dataGaName":163,"dataGaLocation":47},"/fr-fr/solutions/finance/","financial services",{"title":165,"links":166},"Ressources",[167,172,177,182,187,192,196,200,205,210,215,220,225,230],{"text":168,"config":169},"Installation",{"href":170,"dataGaName":171,"dataGaLocation":47},"/fr-fr/install/","install",{"text":173,"config":174},"Guides de démarrage rapide",{"href":175,"dataGaName":176,"dataGaLocation":47},"/fr-fr/get-started/","quick setup checklists",{"text":178,"config":179},"Apprentissage",{"href":180,"dataGaName":181,"dataGaLocation":47},"https://university.gitlab.com/","learn",{"text":183,"config":184},"Documentation sur le produit",{"href":185,"dataGaName":186,"dataGaLocation":47},"https://docs.gitlab.com/","docs",{"text":188,"config":189},"Blog",{"href":190,"dataGaName":191},"/fr-fr/blog/","blog",{"text":193,"config":194},"Histoires de réussite client",{"href":195,"dataGaLocation":47},"/fr-fr/customers/",{"text":197,"config":198},"Histoires de succès client",{"href":195,"dataGaName":199,"dataGaLocation":47},"customer success stories",{"text":201,"config":202},"Travail à distance",{"href":203,"dataGaName":204,"dataGaLocation":47},"https://handbook.gitlab.com/handbook/company/culture/all-remote/","remote",{"text":206,"config":207},"Services GitLab",{"href":208,"dataGaName":209,"dataGaLocation":47},"/fr-fr/services/","services",{"text":211,"config":212},"TeamOps",{"href":213,"dataGaName":214,"dataGaLocation":47},"/fr-fr/teamops/","teamops",{"text":216,"config":217},"Communauté",{"href":218,"dataGaName":219,"dataGaLocation":47},"/community/","community",{"text":221,"config":222},"Forum",{"href":223,"dataGaName":224,"dataGaLocation":47},"https://forum.gitlab.com/","forum",{"text":226,"config":227},"Événements",{"href":228,"dataGaName":229,"dataGaLocation":47},"/events/","events",{"text":231,"config":232},"Partenaires",{"href":233,"dataGaName":234,"dataGaLocation":47},"/fr-fr/partners/","partners",{"title":236,"links":237},"Société",[238,243,248,253,258,263,268,272,277,282,287,292],{"text":239,"config":240},"À propos",{"href":241,"dataGaName":242,"dataGaLocation":47},"/fr-fr/company/","company",{"text":244,"config":245},"Emplois",{"href":246,"dataGaName":247,"dataGaLocation":47},"/jobs/","jobs",{"text":249,"config":250},"Leadership",{"href":251,"dataGaName":252,"dataGaLocation":47},"/company/team/e-group/","leadership",{"text":254,"config":255},"Équipe",{"href":256,"dataGaName":257,"dataGaLocation":47},"/company/team/","team",{"text":259,"config":260},"Manuel",{"href":261,"dataGaName":262,"dataGaLocation":47},"https://handbook.gitlab.com/","handbook",{"text":264,"config":265},"Relations avec les investisseurs",{"href":266,"dataGaName":267,"dataGaLocation":47},"https://ir.gitlab.com/","investor relations",{"text":269,"config":270},"Sustainability",{"href":271,"dataGaName":269,"dataGaLocation":47},"/sustainability/",{"text":273,"config":274},"Diversité, inclusion et appartenance (DIB)",{"href":275,"dataGaName":276,"dataGaLocation":47},"/fr-fr/diversity-inclusion-belonging/","Diversity, inclusion and belonging",{"text":278,"config":279},"Centre de confiance",{"href":280,"dataGaName":281,"dataGaLocation":47},"/fr-fr/security/","trust center",{"text":283,"config":284},"Newsletter",{"href":285,"dataGaName":286,"dataGaLocation":47},"/company/contact/","newsletter",{"text":288,"config":289},"Presse",{"href":290,"dataGaName":291,"dataGaLocation":47},"/press/","press",{"text":293,"config":294},"Déclaration de transparence sur l'esclavage moderne",{"href":295,"dataGaName":296,"dataGaLocation":47},"https://handbook.gitlab.com/handbook/legal/modern-slavery-act-transparency-statement/","modern slavery transparency statement",{"title":298,"links":299},"Nous contacter",[300,305,310,315,320,325,330],{"text":301,"config":302},"Échanger avec un expert",{"href":303,"dataGaName":304,"dataGaLocation":47},"/fr-fr/sales/","sales",{"text":306,"config":307},"Aide",{"href":308,"dataGaName":309,"dataGaLocation":47},"/support/","get help",{"text":311,"config":312},"Portail clients GitLab",{"href":313,"dataGaName":314,"dataGaLocation":47},"https://customers.gitlab.com/customers/sign_in/","customer portal",{"text":316,"config":317},"Statut",{"href":318,"dataGaName":319,"dataGaLocation":47},"https://status.gitlab.com/","status",{"text":321,"config":322},"Conditions d'utilisation",{"href":323,"dataGaName":324},"/terms/","terms of use",{"text":326,"config":327},"Déclaration de confidentialité",{"href":328,"dataGaName":329,"dataGaLocation":47},"/fr-fr/privacy/","privacy statement",{"text":331,"config":332},"Préférences en matière de cookies",{"dataGaName":333,"dataGaLocation":47,"id":334,"isOneTrustButton":12},"cookie preferences","ot-sdk-btn",{"items":336},[337,339,342],{"text":321,"config":338},{"href":323,"dataGaName":324,"dataGaLocation":47},{"text":340,"config":341},"Politique de confidentialité",{"href":328,"dataGaName":329,"dataGaLocation":47},{"text":331,"config":343},{"dataGaName":333,"dataGaLocation":47,"id":334,"isOneTrustButton":12},"content:shared:fr-fr:main-footer.yml","Main Footer","shared/fr-fr/main-footer.yml","shared/fr-fr/main-footer",{"_path":349,"_dir":350,"_draft":6,"_partial":6,"_locale":7,"id":351,"visibility":12,"title":352,"button":353,"_id":357,"_type":31,"_source":33,"_file":358,"_stem":359,"_extension":36},"/shared/fr-fr/the-source/banner/the-economics-of-software-innovation-2025-08-18","banner","The Economics of Software Innovation","The Economics of Software Innovation—AI’s $750 Billion Opportunity",{"config":354,"text":356},{"href":355},"/software-innovation-report/","Get the research report","content:shared:fr-fr:the-source:banner:the-economics-of-software-innovation-2025-08-18.yml","shared/fr-fr/the-source/banner/the-economics-of-software-innovation-2025-08-18.yml","shared/fr-fr/the-source/banner/the-economics-of-software-innovation-2025-08-18",{"_path":361,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"logo":362,"subscribeLink":367,"navItems":371,"_id":383,"_type":31,"title":384,"_source":33,"_file":385,"_stem":386,"_extension":36},"/shared/fr-fr/the-source/navigation",{"altText":363,"config":364},"the source logo",{"src":365,"href":366},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1750191004/t7wz1klfb2kxkezksv9t.svg","/fr-fr/the-source/",{"text":368,"config":369},"S'abonner",{"href":370},"#subscribe",[372,376,379],{"text":373,"config":374},"Intelligence artificielle",{"href":375},"/fr-fr/the-source/ai/",{"text":100,"config":377},{"href":378},"/fr-fr/the-source/security/",{"text":380,"config":381},"Plateforme et infrastructure",{"href":382},"/fr-fr/the-source/platform/","content:shared:fr-fr:the-source:navigation.yml","Navigation","shared/fr-fr/the-source/navigation.yml","shared/fr-fr/the-source/navigation",{"_path":388,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"title":389,"description":390,"submitMessage":391,"formData":392,"_id":395,"_type":31,"_source":33,"_file":396,"_stem":397,"_extension":36},"/shared/fr-fr/the-source/newsletter","La newsletter The Source","Recevez une mine d'informations sur l'avenir du développement logiciel.","Vous êtes désormais inscrit à la newsletter The Source.",{"config":393},{"formId":394,"formName":286,"hideRequiredLabel":12},28453,"content:shared:fr-fr:the-source:newsletter.yml","shared/fr-fr/the-source/newsletter.yml","shared/fr-fr/the-source/newsletter",{"_path":4,"_dir":5,"_draft":6,"_partial":6,"_locale":7,"config":399,"seo":400,"content":401,"type":28,"category":5,"slug":29,"_id":30,"_type":31,"title":32,"_source":33,"_file":34,"_stem":35,"_extension":36},{"layout":9,"template":10,"author":11,"featured":12,"sourceCTA":13},{"title":15,"description":16,"ogImage":17},{"title":19,"date":20,"description":21,"timeToRead":22,"heroImage":17,"keyTakeaways":402,"articleBody":27},[24,25,26],{"categoryNames":404},{"ai":373,"platform":380,"security":100},{"_path":406,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"config":407,"seo":408,"content":410,"type":424,"slug":5,"_id":425,"_type":31,"title":7,"_source":33,"_file":426,"_stem":427,"_extension":36},"/fr-fr/the-source/security",{"layout":9},{"title":100,"description":409,"ogImage":7},"Découvrez comment les entreprises peuvent se protéger des dernières menaces de sécurité tout en respectant les exigences de conformité.",[411,417],{"componentName":412,"componentContent":413},"TheSourceCategoryHero",{"title":100,"description":409,"image":414},{"config":415},{"src":416},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463273/aplkxrvwpii26xao5yhi.png",{"componentName":418,"componentContent":419},"TheSourceCategoryMainSection",{"config":420},{"sourceCTAs":421},[422,423,13],"source-lp-guide-to-dynamic-sboms","source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain","category","content:fr-fr:the-source:security:index.yml","fr-fr/the-source/security/index.yml","fr-fr/the-source/security/index",{"_path":429,"_dir":430,"_draft":6,"_partial":6,"_locale":7,"config":431,"title":432,"description":433,"link":434,"_id":440,"_type":31,"_source":33,"_file":441,"_stem":442,"_extension":36},"/shared/fr-fr/the-source/source-lp-ctas/application-security-in-the-digital-age","source-lp-ctas",{"slug":13},"La sécurité des applications à l'ère du numérique","Lisez les [conclusions de notre enquête menée auprès de plus de 5 000 professionnels DevSecOps dans le monde entier](https://about.gitlab.com/fr-fr/developer-survey/2024/security-compliance/) afin de comprendre pourquoi les entreprises sont confrontées à l'augmentation des surfaces d'attaque et à l'évolution des comportements à l'égard de la sécurité et de l'IA.",{"text":435,"config":436},"Lire le rapport",{"href":437,"dataGaName":438,"dataGaLocation":439},"/fr-fr/developer-survey/2024/security-compliance/","Application Security in the Digital Age","thesource","content:shared:fr-fr:the-source:source-lp-ctas:application-security-in-the-digital-age.yml","shared/fr-fr/the-source/source-lp-ctas/application-security-in-the-digital-age.yml","shared/fr-fr/the-source/source-lp-ctas/application-security-in-the-digital-age",{"_path":406,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"config":444,"seo":445,"content":446,"type":424,"slug":5,"_id":425,"_type":31,"title":7,"_source":33,"_file":426,"_stem":427,"_extension":36},{"layout":9},{"title":100,"description":409,"ogImage":7},[447,451],{"componentName":412,"componentContent":448},{"title":100,"description":409,"image":449},{"config":450},{"src":416},{"componentName":418,"componentContent":452},{"config":453},{"sourceCTAs":454},[422,423,13],[456,460,471],{"_path":429,"_dir":430,"_draft":6,"_partial":6,"_locale":7,"config":457,"title":432,"description":433,"link":458,"_id":440,"_type":31,"_source":33,"_file":441,"_stem":442,"_extension":36},{"slug":13},{"text":435,"config":459},{"href":437,"dataGaName":438,"dataGaLocation":439},{"_path":461,"_dir":430,"_draft":6,"_partial":6,"_locale":7,"config":462,"title":463,"link":464,"_id":468,"_type":31,"_source":33,"_file":469,"_stem":470,"_extension":36},"/shared/fr-fr/the-source/source-lp-ctas/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain",{"slug":423},"Guide pratique sur les vecteurs de menace dans la chaîne d'approvisionnement logicielle",{"config":465},{"href":466,"dataGaName":467,"dataGaLocation":439},"/the-source/security/field-guide-to-threat-vectors-in-the-software-supply-chain/","A field guide to threat vectors in the software supply chain","content:shared:fr-fr:the-source:source-lp-ctas:source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain.yml","shared/fr-fr/the-source/source-lp-ctas/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain.yml","shared/fr-fr/the-source/source-lp-ctas/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain",{"_path":472,"_dir":430,"_draft":6,"_partial":6,"_locale":7,"config":473,"title":474,"description":475,"link":476,"_id":481,"_type":31,"_source":33,"_file":482,"_stem":483,"_extension":36},"/shared/fr-fr/the-source/source-lp-ctas/source-lp-guide-to-dynamic-sboms",{"slug":422},"Guide de GitLab sur les nomenclatures logicielles dynamiques : un élément essentiel du développement logiciel moderne","Découvrez comment gagner en visibilité sur des risques organisationnels jusqu'alors non identifiés grâce à une nomenclature logicielle (SBOM).",{"text":477,"config":478},"Consulter le guide",{"href":479,"dataGaName":480,"dataGaLocation":439},"/the-source/security/guide-to-dynamic-sboms/","Guide to Dynamic SBOMs","content:shared:fr-fr:the-source:source-lp-ctas:source-lp-guide-to-dynamic-sboms.yml","shared/fr-fr/the-source/source-lp-ctas/source-lp-guide-to-dynamic-sboms.yml","shared/fr-fr/the-source/source-lp-ctas/source-lp-guide-to-dynamic-sboms",[485,508,524,540,556,577,597,613,631,651,668,689,705,723,740,758,777,795,814,835,855,871,887,905,923,942,958,976,992,1011],{"_path":486,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":488,"seo":489,"content":491,"type":503,"slug":504,"_id":505,"_type":31,"title":490,"_source":33,"_file":506,"_stem":507,"_extension":36},"/fr-fr/the-source/authors/amanda-rueda","authors",{"layout":9},{"title":490},"Amanda Rueda",[492,501],{"componentName":493,"componentContent":494},"TheSourceAuthorHero",{"config":495,"name":490,"headshot":498},{"gitlabHandle":496,"linkedInProfileUrl":497},"amandarueda","https://www.linkedin.com/in/amandamrueda/",{"altText":490,"config":499},{"src":500},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463383/osecw1pzbxvb7fhqhiky.png",{"componentName":502},"TheSourceArticlesList","author","amanda-rueda","content:fr-fr:the-source:authors:amanda-rueda.yml","fr-fr/the-source/authors/amanda-rueda.yml","fr-fr/the-source/authors/amanda-rueda",{"_path":509,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":510,"seo":511,"content":513,"type":503,"slug":520,"_id":521,"_type":31,"title":512,"_source":33,"_file":522,"_stem":523,"_extension":36},"/fr-fr/the-source/authors/andre-michael-braun",{"layout":9},{"title":512},"Andre Michael Braun",[514,519],{"componentName":493,"componentContent":515},{"name":512,"headshot":516},{"altText":512,"config":517},{"src":518},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463336/yl27k7wdlnkzsizwknn1.jpg",{"componentName":502},"andre-michael-braun","content:fr-fr:the-source:authors:andre-michael-braun.yml","fr-fr/the-source/authors/andre-michael-braun.yml","fr-fr/the-source/authors/andre-michael-braun",{"_path":525,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":526,"seo":527,"content":529,"type":503,"slug":536,"_id":537,"_type":31,"title":528,"_source":33,"_file":538,"_stem":539,"_extension":36},"/fr-fr/the-source/authors/andrew-haschka",{"layout":9},{"title":528},"Andrew Haschka",[530,535],{"componentName":493,"componentContent":531},{"name":528,"headshot":532},{"altText":528,"config":533},{"src":534},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463349/z1qnc4uxmqgg3hnm3da4.png",{"componentName":502},"andrew-haschka","content:fr-fr:the-source:authors:andrew-haschka.yml","fr-fr/the-source/authors/andrew-haschka.yml","fr-fr/the-source/authors/andrew-haschka",{"_path":541,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":542,"seo":543,"content":545,"type":503,"slug":552,"_id":553,"_type":31,"title":544,"_source":33,"_file":554,"_stem":555,"_extension":36},"/fr-fr/the-source/authors/ayoub-fandi",{"layout":9},{"title":544},"Ayoub Fandi",[546,551],{"componentName":493,"componentContent":547},{"name":544,"headshot":548},{"altText":544,"config":549},{"src":550},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463329/wyp554loeyoibx3ozren.jpg",{"componentName":502},"ayoub-fandi","content:fr-fr:the-source:authors:ayoub-fandi.yml","fr-fr/the-source/authors/ayoub-fandi.yml","fr-fr/the-source/authors/ayoub-fandi",{"_path":557,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":558,"seo":559,"content":561,"type":503,"slug":573,"_id":574,"_type":31,"title":560,"_source":33,"_file":575,"_stem":576,"_extension":36},"/fr-fr/the-source/authors/brian-wald",{"layout":9},{"title":560},"Brian Wald",[562,572],{"componentName":493,"componentContent":563},{"config":564,"name":560,"role":567,"bio":568,"headshot":569},{"gitlabHandle":565,"linkedInProfileUrl":566},"brianwald","https://www.linkedin.com/in/brianwald/","Head of Global Field CTO org","Brian Wald est Head of Global Field CTO org chez GitLab. Il dirige une équipe dynamique de directeurs techniques de terrain, dédiée à la transformation des pratiques de développement logiciel en entreprise.",{"altText":560,"config":570},{"src":571},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463417/fugpbux9miqbdx3wewtu.jpg",{"componentName":502},"brian-wald","content:fr-fr:the-source:authors:brian-wald.yml","fr-fr/the-source/authors/brian-wald.yml","fr-fr/the-source/authors/brian-wald",{"_path":578,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":579,"seo":580,"content":582,"type":503,"slug":593,"_id":594,"_type":31,"title":581,"_source":33,"_file":595,"_stem":596,"_extension":36},"/fr-fr/the-source/authors/bryan-ross",{"layout":9},{"title":581},"Bryan Ross",[583,592],{"componentName":493,"componentContent":584},{"config":585,"name":581,"headshot":589},{"gitlabHandle":586,"twitterXProfileUrl":587,"linkedInProfileUrl":588},"bryanrossuk","https://twitter.com/bryanrossuk","https://www.linkedin.com/in/bryanross",{"altText":581,"config":590},{"src":591},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463324/mvdyvskii4hltdrgqxom.jpg",{"componentName":502},"bryan-ross","content:fr-fr:the-source:authors:bryan-ross.yml","fr-fr/the-source/authors/bryan-ross.yml","fr-fr/the-source/authors/bryan-ross",{"_path":598,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":599,"seo":600,"content":602,"type":503,"slug":609,"_id":610,"_type":31,"title":601,"_source":33,"_file":611,"_stem":612,"_extension":36},"/fr-fr/the-source/authors/chandler-gibbons",{"layout":9},{"title":601},"Chandler Gibbons",[603,608],{"componentName":493,"componentContent":604},{"name":601,"headshot":605},{"altText":601,"config":606},{"src":607},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463362/o7g9fqtqtjvegfwniuxh.jpg",{"componentName":502},"chandler-gibbons","content:fr-fr:the-source:authors:chandler-gibbons.yml","fr-fr/the-source/authors/chandler-gibbons.yml","fr-fr/the-source/authors/chandler-gibbons",{"_path":614,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":615,"seo":616,"content":618,"type":503,"slug":627,"_id":628,"_type":31,"title":617,"_source":33,"_file":629,"_stem":630,"_extension":36},"/fr-fr/the-source/authors/dave-steer",{"layout":9},{"title":617},"Dave Steer",[619,626],{"componentName":493,"componentContent":620},{"config":621,"name":617,"headshot":623},{"gitlabHandle":622},"dsteer",{"altText":617,"config":624},{"src":625},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463457/zbtapdkglu3yb9suaq7w.png",{"componentName":502},"dave-steer","content:fr-fr:the-source:authors:dave-steer.yml","fr-fr/the-source/authors/dave-steer.yml","fr-fr/the-source/authors/dave-steer",{"_path":632,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":633,"seo":634,"content":636,"type":503,"slug":646,"_id":647,"_type":31,"title":648,"_source":33,"_file":649,"_stem":650,"_extension":36},"/fr-fr/the-source/authors/ddesanto",{"layout":9},{"title":635},"David DeSanto",[637,645],{"componentName":493,"componentContent":638},{"config":639,"name":635,"headshot":642},{"gitlabHandle":640,"linkedInProfileUrl":641},"david","https://www.linkedin.com/in/ddesanto/",{"altText":635,"config":643},{"src":644},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463446/bgnljs84zcsxj0t6nvix.png",{"componentName":502},"ddesanto","content:fr-fr:the-source:authors:ddesanto.yml","Ddesanto","fr-fr/the-source/authors/ddesanto.yml","fr-fr/the-source/authors/ddesanto",{"_path":652,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":653,"seo":654,"content":656,"type":503,"slug":663,"_id":664,"_type":31,"title":665,"_source":33,"_file":666,"_stem":667,"_extension":36},"/fr-fr/the-source/authors/derek-debellis",{"layout":9},{"title":655},"Derek DeBellis",[657,662],{"componentName":493,"componentContent":658},{"name":655,"headshot":659},{"altText":655,"config":660},{"src":661},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463385/sbnjwfaguszi5g2smzr7.png",{"componentName":502},"derek-debellis","content:fr-fr:the-source:authors:derek-debellis.yml","Derek Debellis","fr-fr/the-source/authors/derek-debellis.yml","fr-fr/the-source/authors/derek-debellis",{"_path":669,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":670,"seo":671,"content":673,"type":503,"slug":685,"_id":686,"_type":31,"title":672,"_source":33,"_file":687,"_stem":688,"_extension":36},"/fr-fr/the-source/authors/emilio-salvador",{"layout":9},{"title":672},"Emilio Salvador",[674,684],{"componentName":493,"componentContent":675},{"config":676,"name":672,"role":679,"bio":680,"headshot":681},{"gitlabHandle":677,"linkedInProfileUrl":678},"esalvadorp","https://www.linkedin.com/in/emiliosp/","Vice President, Strategy and Developer Relations","Emilio Salvador est Vice President de la stratégie et des relations avec les développeurs chez GitLab. Cadre dans le domaine des technologies avec plus de 20 ans d'expérience, Emilio a occupé des postes chez Amazon et Microsoft. Il a plus récemment dirigé la stratégie et les opérations de l'équipe « Developer Advocacy and Experience » chez Google. Il est titulaire d'un MBA de la Sloan School of Management du MIT.",{"altText":672,"config":682},{"src":683},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463402/g0snp3uisjm4tj3pkqcw.jpg",{"componentName":502},"emilio-salvador","content:fr-fr:the-source:authors:emilio-salvador.yml","fr-fr/the-source/authors/emilio-salvador.yml","fr-fr/the-source/authors/emilio-salvador",{"_path":690,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":691,"seo":692,"content":694,"type":503,"slug":701,"_id":702,"_type":31,"title":693,"_source":33,"_file":703,"_stem":704,"_extension":36},"/fr-fr/the-source/authors/erika-feldman",{"layout":9},{"title":693},"Erika Feldman",[695,700],{"componentName":493,"componentContent":696},{"name":693,"headshot":697},{"altText":693,"config":698},{"src":699},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463354/d9quqvz7d2ayjwif7vdn.png",{"componentName":502},"erika-feldman","content:fr-fr:the-source:authors:erika-feldman.yml","fr-fr/the-source/authors/erika-feldman.yml","fr-fr/the-source/authors/erika-feldman",{"_path":706,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":707,"seo":708,"content":710,"type":503,"slug":719,"_id":720,"_type":31,"title":709,"_source":33,"_file":721,"_stem":722,"_extension":36},"/fr-fr/the-source/authors/george-kichukov",{"layout":9},{"title":709},"George Kichukov",[711,718],{"componentName":493,"componentContent":712},{"config":713,"name":709,"headshot":715},{"gitlabHandle":714},"gkichukov",{"altText":709,"config":716},{"src":717},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463366/dk2knfancgsxocjkmyoa.jpg",{"componentName":502},"george-kichukov","content:fr-fr:the-source:authors:george-kichukov.yml","fr-fr/the-source/authors/george-kichukov.yml","fr-fr/the-source/authors/george-kichukov",{"_path":724,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":725,"seo":726,"content":728,"type":503,"slug":735,"_id":736,"_type":31,"title":737,"_source":33,"_file":738,"_stem":739,"_extension":36},"/fr-fr/the-source/authors/gitlab",{"layout":9},{"title":727},"GitLab",[729,734],{"componentName":493,"componentContent":730},{"name":727,"headshot":731},{"altText":727,"config":732},{"src":733},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463461/ts7io0hgpdyqylbzfire.png",{"componentName":502},"gitlab","content:fr-fr:the-source:authors:gitlab.yml","Gitlab","fr-fr/the-source/authors/gitlab.yml","fr-fr/the-source/authors/gitlab",{"_path":741,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":742,"seo":743,"content":745,"type":503,"slug":754,"_id":755,"_type":31,"title":744,"_source":33,"_file":756,"_stem":757,"_extension":36},"/fr-fr/the-source/authors/grant-hickman",{"layout":9},{"title":744},"Grant Hickman",[746,753],{"componentName":493,"componentContent":747},{"config":748,"name":744,"headshot":750},{"gitlabHandle":749},"g.hickman",{"altText":744,"config":751},{"src":752},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463463/f3uqwtugqotyhwutz5gu.png",{"componentName":502},"grant-hickman","content:fr-fr:the-source:authors:grant-hickman.yml","fr-fr/the-source/authors/grant-hickman.yml","fr-fr/the-source/authors/grant-hickman",{"_path":759,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":760,"seo":761,"content":763,"type":503,"slug":773,"_id":774,"_type":31,"title":762,"_source":33,"_file":775,"_stem":776,"_extension":36},"/fr-fr/the-source/authors/haim-snir",{"layout":9},{"title":762},"Haim Snir",[764,772],{"componentName":493,"componentContent":765},{"config":766,"name":762,"headshot":769},{"gitlabHandle":767,"linkedInProfileUrl":768},"hsnir1","https://www.linkedin.com/in/haimsnir/",{"altText":762,"config":770},{"src":771},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463395/nubmshvaq8wpomopllni.png",{"componentName":502},"haim-snir","content:fr-fr:the-source:authors:haim-snir.yml","fr-fr/the-source/authors/haim-snir.yml","fr-fr/the-source/authors/haim-snir",{"_path":778,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":779,"seo":780,"content":782,"type":503,"slug":786,"_id":791,"_type":31,"title":792,"_source":33,"_file":793,"_stem":794,"_extension":36},"/fr-fr/the-source/authors/iganbaruch",{"layout":9},{"title":781},"Itzik Gan Baruch",[783,790],{"componentName":493,"componentContent":784},{"config":785,"name":781,"headshot":787},{"gitlabHandle":786},"iganbaruch",{"altText":781,"config":788},{"src":789},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463443/vibb2fkc0ojni2d1eqde.png",{"componentName":502},"content:fr-fr:the-source:authors:iganbaruch.yml","Iganbaruch","fr-fr/the-source/authors/iganbaruch.yml","fr-fr/the-source/authors/iganbaruch",{"_path":796,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":797,"seo":798,"content":800,"type":503,"slug":809,"_id":810,"_type":31,"title":811,"_source":33,"_file":812,"_stem":813,"_extension":36},"/fr-fr/the-source/authors/jlongo",{"layout":9},{"title":799},"Joseph Longo",[801,808],{"componentName":493,"componentContent":802},{"config":803,"name":799,"headshot":805},{"gitlabHandle":804},"jlongo_gitlab",{"altText":799,"config":806},{"src":807},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463434/uoxaknpmoposbbgzqji8.png",{"componentName":502},"jlongo","content:fr-fr:the-source:authors:jlongo.yml","Jlongo","fr-fr/the-source/authors/jlongo.yml","fr-fr/the-source/authors/jlongo",{"_path":815,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":816,"seo":817,"content":819,"type":503,"slug":831,"_id":832,"_type":31,"title":818,"_source":33,"_file":833,"_stem":834,"_extension":36},"/fr-fr/the-source/authors/joel-krooswyk",{"layout":9},{"title":818},"Joel Krooswyk",[820,830],{"componentName":493,"componentContent":821},{"config":822,"name":818,"role":825,"bio":826,"headshot":827},{"gitlabHandle":823,"linkedInProfileUrl":824},"jkrooswyk","https://www.linkedin.com/in/joelrkrooswyk/","Federal CTO","Joel Krooswyk est federal CTO chez GitLab. Joel contribue activement à la croissance de GitLab depuis 2017. Ses 25 années d'expérience en matière de leadership couvrent non seulement le secteur public américain, mais aussi les petites, moyennes et grandes entreprises à l'échelle mondiale. Joel cumule une profonde expertise en matière de politique gouvernementale avec une riche expérience dans les domaines de la technologie, du développement logiciel, de l'IA et de la cybersécurité. Il est souvent sollicité par le secteur public comme privé pour fournir des commentaires et des réponses dans le cadre de leurs politiques.",{"altText":818,"config":828},{"src":829},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463423/mkmdhuxsjggfvokdmdv7.jpg",{"componentName":502},"joel-krooswyk","content:fr-fr:the-source:authors:joel-krooswyk.yml","fr-fr/the-source/authors/joel-krooswyk.yml","fr-fr/the-source/authors/joel-krooswyk",{"_path":836,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":837,"seo":838,"content":840,"type":503,"slug":11,"_id":852,"_type":31,"title":839,"_source":33,"_file":853,"_stem":854,"_extension":36},"/fr-fr/the-source/authors/josh-lemos",{"layout":9},{"title":839},"Josh Lemos",[841,851],{"componentName":493,"componentContent":842},{"config":843,"name":839,"role":846,"bio":847,"headshot":848},{"gitlabHandle":844,"linkedInProfileUrl":845},"joshlemos","https://www.linkedin.com/in/joshlemos/","Chief Information Security Officer","Josh Lemos, Chief Information Security Officer chez GitLab Inc., bénéficie de 20 ans d'expérience dans la direction d'équipes de sécurité de l'information. Il est responsable de la vision, de la stratégie et du programme de l'entreprise dans le but de protéger efficacement les actifs et les technologies de l'information. Il a également pour mission de renforcer la plateforme DevSecOps de Gitlab et d'offrir une sécurité de pointe aux clients.",{"altText":839,"config":849},{"src":850},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463405/f4rqtiecakrekvxfhqar.jpg",{"componentName":502},"content:fr-fr:the-source:authors:josh-lemos.yml","fr-fr/the-source/authors/josh-lemos.yml","fr-fr/the-source/authors/josh-lemos",{"_path":856,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":857,"seo":858,"content":860,"type":503,"slug":867,"_id":868,"_type":31,"title":859,"_source":33,"_file":869,"_stem":870,"_extension":36},"/fr-fr/the-source/authors/julie-griffin",{"layout":9},{"title":859},"Julie Griffin",[861,866],{"componentName":493,"componentContent":862},{"name":859,"headshot":863},{"altText":859,"config":864},{"src":865},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463371/hqkbr3uk8hw2de7tltn4.webp",{"componentName":502},"julie-griffin","content:fr-fr:the-source:authors:julie-griffin.yml","fr-fr/the-source/authors/julie-griffin.yml","fr-fr/the-source/authors/julie-griffin",{"_path":872,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":873,"seo":874,"content":876,"type":503,"slug":883,"_id":884,"_type":31,"title":875,"_source":33,"_file":885,"_stem":886,"_extension":36},"/fr-fr/the-source/authors/kristina-weis",{"layout":9},{"title":875},"Kristina Weis",[877,882],{"componentName":493,"componentContent":878},{"name":875,"headshot":879},{"altText":875,"config":880},{"src":881},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463469/eoolq6n6bs0zb8gmf0js.webp",{"componentName":502},"kristina-weis","content:fr-fr:the-source:authors:kristina-weis.yml","fr-fr/the-source/authors/kristina-weis.yml","fr-fr/the-source/authors/kristina-weis",{"_path":888,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":889,"seo":890,"content":892,"type":503,"slug":901,"_id":902,"_type":31,"title":891,"_source":33,"_file":903,"_stem":904,"_extension":36},"/fr-fr/the-source/authors/lee-faus",{"layout":9},{"title":891},"Lee Faus",[893,900],{"componentName":493,"componentContent":894},{"config":895,"name":891,"headshot":897},{"gitlabHandle":896},"lfaus",{"altText":891,"config":898},{"src":899},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463398/vivhlomglvnstamj54bo.jpg",{"componentName":502},"lee-faus","content:fr-fr:the-source:authors:lee-faus.yml","fr-fr/the-source/authors/lee-faus.yml","fr-fr/the-source/authors/lee-faus",{"_path":906,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":907,"seo":908,"content":910,"type":503,"slug":914,"_id":919,"_type":31,"title":920,"_source":33,"_file":921,"_stem":922,"_extension":36},"/fr-fr/the-source/authors/ncregan",{"layout":9},{"title":909},"Niall Cregan",[911,918],{"componentName":493,"componentContent":912},{"config":913,"name":909,"headshot":915},{"gitlabHandle":914},"ncregan",{"altText":909,"config":916},{"src":917},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463431/yrtwodocb4cu3j7lkhyo.png",{"componentName":502},"content:fr-fr:the-source:authors:ncregan.yml","Ncregan","fr-fr/the-source/authors/ncregan.yml","fr-fr/the-source/authors/ncregan",{"_path":924,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":925,"seo":926,"content":928,"type":503,"slug":937,"_id":938,"_type":31,"title":939,"_source":33,"_file":940,"_stem":941,"_extension":36},"/fr-fr/the-source/authors/rschulman",{"layout":9},{"title":927},"Robin Schulman",[929,936],{"componentName":493,"componentContent":930},{"config":931,"name":927,"headshot":933},{"gitlabHandle":932},"robin",{"altText":927,"config":934},{"src":935},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463437/u2xfbudw1f8hhnkrgaoy.webp",{"componentName":502},"rschulman","content:fr-fr:the-source:authors:rschulman.yml","Rschulman","fr-fr/the-source/authors/rschulman.yml","fr-fr/the-source/authors/rschulman",{"_path":943,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":944,"seo":945,"content":947,"type":503,"slug":954,"_id":955,"_type":31,"title":946,"_source":33,"_file":956,"_stem":957,"_extension":36},"/fr-fr/the-source/authors/sabrina-farmer",{"layout":9},{"title":946},"Sabrina Farmer",[948,953],{"componentName":493,"componentContent":949},{"name":946,"headshot":950},{"altText":946,"config":951},{"src":952},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463377/udmzbjjr5xrcrffdlphx.webp",{"componentName":502},"sabrina-farmer","content:fr-fr:the-source:authors:sabrina-farmer.yml","fr-fr/the-source/authors/sabrina-farmer.yml","fr-fr/the-source/authors/sabrina-farmer",{"_path":959,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":960,"seo":961,"content":963,"type":503,"slug":972,"_id":973,"_type":31,"title":962,"_source":33,"_file":974,"_stem":975,"_extension":36},"/fr-fr/the-source/authors/sandra-gittlen",{"layout":9},{"title":962},"Sandra Gittlen",[964,971],{"componentName":493,"componentContent":965},{"config":966,"name":962,"headshot":968},{"gitlabHandle":967},"sgittlen",{"altText":962,"config":969},{"src":970},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463466/r7ckb9h2zr4c2rsz3zlm.png",{"componentName":502},"sandra-gittlen","content:fr-fr:the-source:authors:sandra-gittlen.yml","fr-fr/the-source/authors/sandra-gittlen.yml","fr-fr/the-source/authors/sandra-gittlen",{"_path":977,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":978,"seo":979,"content":981,"type":503,"slug":988,"_id":989,"_type":31,"title":980,"_source":33,"_file":990,"_stem":991,"_extension":36},"/fr-fr/the-source/authors/sharon-gaudin",{"layout":9},{"title":980},"Sharon Gaudin",[982,987],{"componentName":493,"componentContent":983},{"name":980,"headshot":984},{"altText":980,"config":985},{"src":986},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463475/h6j4nnvykzyfzgvl7txb.webp",{"componentName":502},"sharon-gaudin","content:fr-fr:the-source:authors:sharon-gaudin.yml","fr-fr/the-source/authors/sharon-gaudin.yml","fr-fr/the-source/authors/sharon-gaudin",{"_path":993,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":994,"seo":995,"content":997,"type":503,"slug":1007,"_id":1008,"_type":31,"title":996,"_source":33,"_file":1009,"_stem":1010,"_extension":36},"/fr-fr/the-source/authors/stephen-walters",{"layout":9},{"title":996},"Stephen Walters",[998,1006],{"componentName":493,"componentContent":999},{"config":1000,"name":996,"headshot":1003},{"gitlabHandle":1001,"linkedInProfileUrl":1002},"swalters1","https://www.linkedin.com/in/1stephenwalters/",{"altText":996,"config":1004},{"src":1005},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463392/g6ktk5qb4vcqc9wqjlf9.jpg",{"componentName":502},"stephen-walters","content:fr-fr:the-source:authors:stephen-walters.yml","fr-fr/the-source/authors/stephen-walters.yml","fr-fr/the-source/authors/stephen-walters",{"_path":1012,"_dir":487,"_draft":6,"_partial":6,"_locale":7,"config":1013,"seo":1014,"content":1016,"type":503,"slug":1028,"_id":1029,"_type":31,"title":1030,"_source":33,"_file":1031,"_stem":1032,"_extension":36},"/fr-fr/the-source/authors/taylor-mccaslin",{"layout":9},{"title":1015},"Taylor McCaslin",[1017,1027],{"componentName":493,"componentContent":1018},{"config":1019,"name":1015,"role":1022,"bio":1023,"headshot":1024},{"gitlabHandle":1020,"linkedInProfileUrl":1021},"tmccaslin","https://www.linkedin.com/in/taylormccaslin/","Group Manager, Product - Data Science","Taylor McCaslin est Product Lead IA/ML chez GitLab et supervise les chefs de produit en charge des groupes dédiés aux fonctionnalités d'IA et au cycle de vie des modèles d'IA (ModelOps). Il définit la vision et oriente les processus afin d'intégrer la science des données au programme DevOps de GitLab. Avant de rejoindre GitLab, Taylor a forgé son expérience chez Indeed, Duo Security et WP Engine.",{"altText":1015,"config":1025},{"src":1026},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463427/trfasilaeasosxfcxmsm.jpg",{"componentName":502},"taylor-mccaslin","content:fr-fr:the-source:authors:taylor-mccaslin.yml","Taylor Mccaslin","fr-fr/the-source/authors/taylor-mccaslin.yml","fr-fr/the-source/authors/taylor-mccaslin",1761814448257]