[{"data":1,"prerenderedAt":1049},["ShallowReactive",2],{"/it-it/the-source/security/why-legacy-code-is-a-security-risk-and-how-ai-can-help/":3,"footer-it-it":53,"the-source-banner-it-it":360,"the-source-navigation-it-it":372,"the-source-newsletter-it-it":399,"article-site-categories-it-it":410,"why-legacy-code-is-a-security-risk-and-how-ai-can-help-article-hero-category-it-it":412,"why-legacy-code-is-a-security-risk-and-how-ai-can-help-the-source-gated-asset-it-it":436,"why-legacy-code-is-a-security-risk-and-how-ai-can-help-category-it-it":449,"why-legacy-code-is-a-security-risk-and-how-ai-can-help-the-source-resources-it-it":461,"why-legacy-code-is-a-security-risk-and-how-ai-can-help-article-hero-author-it-it":500},{"_path":4,"_dir":5,"_draft":6,"_partial":6,"_locale":7,"slug":8,"type":9,"category":5,"config":10,"seo":16,"content":21,"_id":47,"_type":48,"title":7,"_source":49,"_file":50,"_stem":51,"_extension":52},"/it-it/the-source/security/why-legacy-code-is-a-security-risk-and-how-ai-can-help","security",false,"","why-legacy-code-is-a-security-risk-and-how-ai-can-help","article",{"layout":11,"template":12,"featured":6,"articleType":13,"author":14,"gatedAsset":15},"the-source","TheSourceArticle","Regular","joel-krooswyk","source-lp-how-a-devsecops-platform-drives-business-success-the-complete-guide",{"description":17,"ogDescription":17,"ogImage":18,"title":19,"ogTitle":19,"noIndex":20},"Scopri come il refactoring del codice basato su IA può modernizzare i sistemi legacy, migliorare i protocolli di sicurezza e portare la tua azienda nel futuro.","https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463670/cdynzww9p2annh3mmbhl.png","Come proteggerti dal codice legacy rischioso con l'IA",true,{"heroImage":18,"title":22,"description":23,"timeToRead":24,"date":25,"keyTakeaways":26,"articleBody":30,"faq":31},"Perché il codice legacy è un rischio per la sicurezza e come proteggerti con l'IA","Scopri come il refactoring del codice basato sull'IA può modernizzare i sistemi legacy, migliorare i protocolli di sicurezza e traghettare la tua azienda verso il futuro.","Tempo di lettura: 6 minuti","2025-01-15",[27,28,29],"Il codice legacy è costoso e richiede tempo per la manutenzione. Inoltre, se non è compatibile con gli strumenti di sicurezza più recenti, può rappresentare un grave rischio per le aziende di tutti i settori.","Il refactoring può aiutare a rendere il codice più leggibile, migliorando la stabilità della codebase nonché la produttività e l'efficienza degli sviluppatori.","Insieme agli strumenti di sicurezza preventiva, il refactoring del codice basato sull'IA può contribuire a modernizzare il codice legacy, riducendo al contempo il rischio di vulnerabilità della sicurezza.","Today’s rapid acceleration of technology is exciting. It means new products and opportunities for growth and innovation are around every corner. And yet this speed of growth and change has its downsides, especially regarding security: just one bad actor can cause massive business disruption, reputation damage, and lost revenue.\n\nYou have likely heard industry leaders talk about their need for digital transformation and the worrisome dependency on outdated or “legacy” systems. While legacy code is not inherently problematic, it often isn’t compatible with modern security tools, leading to exploitable vulnerabilities. Coupled with open source code — which requires ongoing security vigilance — your code base may be putting your organization’s data, users, and reputation at risk. \n\nLegacy code is risky from a security and compliance perspective, and it’s also expensive and time-consuming for developers to maintain — if developers on your team even have the legacy knowledge to do the work. \n\nUltimately, this industry-wide reliance on legacy code is a concerning and costly practice. So, how do we work our way out of it?  \n\nBelow, I’ll explore legacy code and how organizations can increase the security of their code base with AI-powered code refactoring. Together with AI-driven testing and security capabilities, code refactoring will propel your codebase into the future while empowering your whole team to look ahead, not behind. \n\n## What is legacy code? \n\nBroadly, legacy code refers to an existing code base that a team inherits from previous team members and continues to use and maintain. The code might work just fine, but several different developers have likely modified it over the years. The current team might struggle to identify which modifications are valuable and which are not. Additionally, the code might be written using an outdated framework or in a programming language that no one on the team knows (whether it’s simply old or completely obsolete). \n\nIt might seem strange that companies still rely on legacy code. While the reasons can vary, think of it like this: You live in an old house. It's cozy and familiar, but the plumbing's unreliable, the wiring is outdated, and every time you fix one thing, something else breaks. Sure, you could remodel, but that means a huge upheaval – contractors, permits, living in chaos for months, and costs that can spiral out of control.\n\nSo, you keep patching things up, hoping for the best. It's not ideal, but it works — for now. That's kind of what it's like with legacy code. It's the familiar, “working” solution, even if it's creaky and inefficient. Rewriting it from scratch is a daunting prospect with its own risks and costs. Plus, who has time for a massive overhaul when there are new features to build and urgent bugs to fix?\n\nWhen it comes to updating code, many companies decide to keep their legacy code because maintaining it can be less disruptive in the short term. Updating code involves a lot of developing and testing code. It can also involve training a team to ensure they have the skills to work with the outdated code language or framework. If there isn’t any documentation, it can be even more challenging to navigate.   \n\n## What’s the problem with legacy code?\n\nIf your organization does decide to stick with your legacy code — and many do — you’re opening yourself up to a host of potential issues. Since this code wasn’t designed for newer tech, you might not be able to integrate it with the latest and greatest software (like AI tools, for example), which could also impact the performance and scalability of your products. This can hold you back and impact customer experience down the line. \n\nWhat’s most concerning about legacy code, whether it was written five years ago or 50, is that there may be no security scanners that work for this code. That means you can’t detect problems on your own while making updates. Moreover, developers making these updates may not understand the language or its structure well and might even accidentally create vulnerable code in the process. Finally, older applications are commonly written in C or C++, which are memory unsafe languages — proven to host [70% of identified vulnerabilities](https://www.cisa.gov/news-events/news/urgent-need-memory-safety-software-products).\n\nThese three issues — the fact that there may be no way to secure legacy code, there are fewer ways to safely update it, and that the end result is far more likely to be vulnerable — should be warning signs for organizations across industries. \n\nIn developing a catalog of bad practices that can put critical infrastructure at risk, the U.S. [Cybersecurity and Infrastructure Security Agency](https://www.cisa.gov/stopransomware/bad-practices) added the following:\n\n“Use of unsupported (or end-of-life) software in service of Critical Infrastructure and National Critical Functions is dangerous and significantly elevates risk to national security, national economic security, and national public health and safety. This dangerous practice is especially egregious in technologies accessible from the Internet.”\n\nEven if you aren’t working in national security or for national public health and safety, this warning is still applicable: Using old code is not a best practice. It’s a bad one. \n\n## The solution: Code refactoring\n\nAccording to software developer and author [Martin Fowler](https://www.martinfowler.com/), “Refactoring is a controlled technique for improving the design of an existing code base, a disciplined technique for restructuring an existing body of code, altering its internal structure without changing its external behavior.” \n\nIn other words, code refactoring allows you to secure and modernize your legacy code without obscuring its original functionality. \n\nThere are many refactoring techniques — from inline refactoring, which involves simplifying code by removing obsolete elements, to refactoring by abstraction, where duplicate code is deleted. What’s important to know is that code refactoring requires time and significant developer skills to do well. It also requires a lot of testing when developers are already busy working on other tasks. \n\nSo, while code refactoring is certainly the answer to bringing your legacy code into the future, making it readable, efficient, and secure, it is a project in and of itself, especially at scale. \n\n## How AI can help\n\nWe know that AI is already accelerating the software development lifecycle — and there’s a lot that [AI can do to help teams accelerate the refactoring process](https://about.gitlab.com/blog/2024/08/26/refactor-code-into-modern-languages-with-ai-powered-gitlab-duo/), too. For example, tools like [GitLab Duo](https://about.gitlab.com/blog/2024/04/18/gitlab-duo-chat-now-generally-available/) can help explain existing code and create new code, two of the biggest hurdles when modernizing legacy code. If a developer isn’t familiar with a language, AI can help fill in the blanks. Regarding testing and security, AI can also [analyze root causes, generate tests](https://about.gitlab.com/blog/2024/06/06/developing-gitlab-duo-blending-ai-and-root-cause-analysis-to-fix-ci-cd/), and [help developers remediate vulnerabilities](https://about.gitlab.com/the-source/ai/understand-and-resolve-vulnerabilities-with-ai-powered-gitlab-duo/). With AI in your toolkit, code refactoring can finally be more accessible and achievable for organizations, so they can move this project off their backlog for good. \n\nAccording to [our research](https://about.gitlab.com/developer-survey/2024/ai/), 34% of all respondents using AI across the software development lifecycle already use AI to modernize legacy code. This is even higher in the financial services industry (46%). \n\nOf course, there are a few things to keep in mind as you start to implement AI in any of your practices. \n\nAI isn’t perfect. It still requires testing, guardrails, and human oversight. So, while it absolutely can facilitate and accelerate some of these critical, time-consuming manual tasks, it can’t do this work alone. Especially regarding security, you should implement other tools to keep your code as secure as possible. We recommend creating a [dynamic software bill of materials](https://about.gitlab.com/blog/2022/10/25/the-ultimate-guide-to-sboms/) (also called an SBOM) to give you full visibility into the license and security risks associated with your software, including any legacy code you may have.\n\n## Bring your codebase into the future\n\nWhile the jump from legacy codebase maintenance to modernization might feel daunting, it is the best path forward if you want to keep your organization and user data secure. With the right tools and methods, it may be more efficient for your teams and cost-effective for your company. \n\nThe good news is that your teams don’t need to spend time and resources deciphering old languages and working with old frameworks — causing frustration, delays, and bottlenecks. By letting AI do the hard work of refactoring your code so that it’s safe, secure, and functioning as it should, developers can focus on what they do best: building new products and features and driving value for customers.",[32,35,38,41,44],{"header":33,"content":34},"Perché il codice legacy è considerato un rischio per la sicurezza?","Il codice legacy è rischioso perché spesso usa framework o linguaggi di programmazione obsoleti, privi di moderne misure di sicurezza. Per questo motivo è incompatibile con gli strumenti di sicurezza più recenti e aumenta il rischio di vulnerabilità. Inoltre, il software non supportato o a fine vita può essere facilmente sfruttato dai malintenzionati, compromettendo l'integrità e la sicurezza dei dati.",{"header":36,"content":37},"In che modo il refactoring del codice basato sull'IA può migliorare la sicurezza del codice legacy?","Il refactoring del codice basato sull'IA modernizza i sistemi legacy:\n - identificando pattern di programmazione obsoleti o non sicuri e suggerendo alternative sicure;\n - automatizzando i miglioramenti del codice senza alterare il comportamento esterno, migliorando la leggibilità e la manutenibilità;\n - generando test di sicurezza e analizzando le cause principali delle vulnerabilità, consentendo una correzione più rapida.\nQuesto approccio riduce il lavoro manuale e accelera la transizione verso codebase più sicure, efficienti e scalabili.",{"header":39,"content":40},"Perché è complesso eseguire la manutenzione del codice legacy senza l'IA?","Le difficoltà includono:\n - __Mancanza di un supporto di sicurezza moderno__: gli scanner di sicurezza tradizionali potrebbero non essere compatibili con il codice legacy.\n - __Framework complessi e obsoleti__: gli sviluppatori potrebbero non avere le competenze necessarie per mantenere o aggiornare il vecchio codice.\n - __Costi di manutenzione elevati__: la manutenzione dei sistemi legacy è costosa e richiede tempo, dirottando le risorse dall'innovazione.\n - __Rischi per la sicurezza__: il codice obsoleto è più soggetto a vulnerabilità e attacchi, aumentando il rischio di violazioni dei dati.",{"header":42,"content":43},"In che modo GitLab supporta il refactoring basato sull'IA e la modernizzazione del codice legacy?","GitLab usa GitLab Duo per aiutare gli sviluppatori a comprendere il codice legacy fornendo spiegazioni e generando nuovo codice. Inoltre, offre:\n - Analisi di sicurezza guidate dall'IA per rilevare vulnerabilità nel codice legacy\n - Test e correzioni automatici per migliorare la sicurezza del codice\n - Distinte base del software dinamiche (SBOM) per la visibilità dei rischi legati alle licenze e alla sicurezza, inclusi i componenti legacy",{"header":45,"content":46},"Quali sono i vantaggi dell'IA nel refactoring del codice legacy?","I vantaggi includono:\n - __Maggiore sicurezza__: l'IA identifica e mitiga le vulnerabilità, migliorando la security posture.\n - __Maggiore produttività__: l'automazione delle attività ripetitive consente agli sviluppatori di concentrarsi sull'innovazione.\n - __Risparmio di denaro__: i costi di manutenzione sono ridotti grazie alla modernizzazione del codice, per lavorare con i framework e gli strumenti attuali.\n - __Modernizzazione scalabile__: l'IA consente un refactoring scalabile e coerente su codebase complesse, garantendo risorse software aziendali sempre all'avanguardia.","content:it-it:the-source:security:why-legacy-code-is-a-security-risk-and-how-ai-can-help:index.yml","yaml","content","it-it/the-source/security/why-legacy-code-is-a-security-risk-and-how-ai-can-help/index.yml","it-it/the-source/security/why-legacy-code-is-a-security-risk-and-how-ai-can-help/index","yml",{"_path":54,"_dir":55,"_draft":6,"_partial":6,"_locale":7,"data":56,"_id":356,"_type":48,"title":357,"_source":49,"_file":358,"_stem":359,"_extension":52},"/shared/it-it/main-footer","it-it",{"text":57,"source":58,"edit":64,"contribute":69,"config":74,"items":79,"minimal":348},"Git è un marchio di Software Freedom Conservancy e l'uso del termine \"GitLab\" è regolato da un accordo di licenza",{"text":59,"config":60},"Visualizza origine pagina",{"href":61,"dataGaName":62,"dataGaLocation":63},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/","page source","footer",{"text":65,"config":66},"Modifica questa pagina",{"href":67,"dataGaName":68,"dataGaLocation":63},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/content/","web ide",{"text":70,"config":71},"Contribuisci",{"href":72,"dataGaName":73,"dataGaLocation":63},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/CONTRIBUTING.md/","please contribute",{"twitter":75,"facebook":76,"youtube":77,"linkedin":78},"https://twitter.com/gitlab","https://www.facebook.com/gitlab","https://www.youtube.com/channel/UCnMGQ8QHMAnVIsI3xJrihhg","https://www.linkedin.com/company/gitlab-com",[80,107,180,248,310],{"title":81,"links":82,"subMenu":88},"Piattaforma",[83],{"text":84,"config":85},"Piattaforma DevSecOps",{"href":86,"dataGaName":87,"dataGaLocation":63},"/it-it/platform/","devsecops platform",[89],{"title":90,"links":91},"Prezzi",[92,97,102],{"text":93,"config":94},"Visualizza i piani",{"href":95,"dataGaName":96,"dataGaLocation":63},"/it-it/pricing/","view plans",{"text":98,"config":99},"Perché passare a Premium?",{"href":100,"dataGaName":101,"dataGaLocation":63},"/it-it/pricing/premium/","why premium",{"text":103,"config":104},"Perché passare a Ultimate?",{"href":105,"dataGaName":106,"dataGaLocation":63},"/it-it/pricing/ultimate/","why ultimate",{"title":108,"links":109},"Soluzioni",[110,115,120,125,130,135,140,145,150,155,160,165,170,175],{"text":111,"config":112},"Trasformazione digitale",{"href":113,"dataGaName":114,"dataGaLocation":63},"/it-it/topics/digital-transformation/","digital transformation",{"text":116,"config":117},"Sicurezza e conformità",{"href":118,"dataGaName":119,"dataGaLocation":63},"/solutions/application-security-testing/","Application security testing",{"text":121,"config":122},"Distribuzione software automatizzata",{"href":123,"dataGaName":124,"dataGaLocation":63},"/it-it/solutions/delivery-automation/","automated software delivery",{"text":126,"config":127},"Sviluppo Agile",{"href":128,"dataGaName":129,"dataGaLocation":63},"/it-it/solutions/agile-delivery/","agile delivery",{"text":131,"config":132},"Trasformazione cloud",{"href":133,"dataGaName":134,"dataGaLocation":63},"/it-it/topics/cloud-native/","cloud transformation",{"text":136,"config":137},"SCM",{"href":138,"dataGaName":139,"dataGaLocation":63},"/it-it/solutions/source-code-management/","source code management",{"text":141,"config":142},"CI/CD",{"href":143,"dataGaName":144,"dataGaLocation":63},"/it-it/solutions/continuous-integration/","continuous integration & delivery",{"text":146,"config":147},"Gestione del flusso di valore",{"href":148,"dataGaName":149,"dataGaLocation":63},"/it-it/solutions/value-stream-management/","value stream management",{"text":151,"config":152},"GitOps",{"href":153,"dataGaName":154,"dataGaLocation":63},"/it-it/solutions/gitops/","gitops",{"text":156,"config":157},"Aziende",{"href":158,"dataGaName":159,"dataGaLocation":63},"/it-it/enterprise/","enterprise",{"text":161,"config":162},"Piccole imprese",{"href":163,"dataGaName":164,"dataGaLocation":63},"/it-it/small-business/","small business",{"text":166,"config":167},"Pubblica amministrazione",{"href":168,"dataGaName":169,"dataGaLocation":63},"/it-it/solutions/public-sector/","public sector",{"text":171,"config":172},"Istruzione",{"href":173,"dataGaName":174,"dataGaLocation":63},"/it-it/solutions/education/","education",{"text":176,"config":177},"Servizi finanziari",{"href":178,"dataGaName":179,"dataGaLocation":63},"/it-it/solutions/finance/","financial services",{"title":181,"links":182},"Risorse",[183,188,193,198,203,208,213,218,223,228,233,238,243],{"text":184,"config":185},"Installazione",{"href":186,"dataGaName":187,"dataGaLocation":63},"/it-it/install/","install",{"text":189,"config":190},"Guide rapide",{"href":191,"dataGaName":192,"dataGaLocation":63},"/it-it/get-started/","quick setup checklists",{"text":194,"config":195},"Formazione",{"href":196,"dataGaName":197,"dataGaLocation":63},"https://university.gitlab.com/","learn",{"text":199,"config":200},"Documentazione di prodotto",{"href":201,"dataGaName":202,"dataGaLocation":63},"https://docs.gitlab.com/","docs",{"text":204,"config":205},"Blog",{"href":206,"dataGaName":207,"dataGaLocation":63},"/blog/","blog",{"text":209,"config":210},"Storie di successo dei clienti",{"href":211,"dataGaName":212,"dataGaLocation":63},"/customers/","customer success stories",{"text":214,"config":215},"Lavorare da remoto",{"href":216,"dataGaName":217,"dataGaLocation":63},"https://handbook.gitlab.com/handbook/company/culture/all-remote/","remote",{"text":219,"config":220},"Servizi GitLab",{"href":221,"dataGaName":222,"dataGaLocation":63},"/it-it/services/","services",{"text":224,"config":225},"TeamOps",{"href":226,"dataGaName":227,"dataGaLocation":63},"/it-it/teamops/","teamops",{"text":229,"config":230},"Community",{"href":231,"dataGaName":232,"dataGaLocation":63},"/community/","community",{"text":234,"config":235},"Forum",{"href":236,"dataGaName":237,"dataGaLocation":63},"https://forum.gitlab.com/","forum",{"text":239,"config":240},"Eventi",{"href":241,"dataGaName":242,"dataGaLocation":63},"/events/","events",{"text":244,"config":245},"Partner",{"href":246,"dataGaName":247,"dataGaLocation":63},"/it-it/partners/","partners",{"title":249,"links":250},"Azienda",[251,256,261,266,271,276,281,285,290,295,300,305],{"text":252,"config":253},"Informazioni",{"href":254,"dataGaName":255,"dataGaLocation":63},"/it-it/company/","company",{"text":257,"config":258},"Opportunità di lavoro",{"href":259,"dataGaName":260,"dataGaLocation":63},"/jobs/","jobs",{"text":262,"config":263},"Leadership",{"href":264,"dataGaName":265,"dataGaLocation":63},"/company/team/e-group/","leadership",{"text":267,"config":268},"Team",{"href":269,"dataGaName":270,"dataGaLocation":63},"/company/team/","team",{"text":272,"config":273},"Manuale",{"href":274,"dataGaName":275,"dataGaLocation":63},"https://handbook.gitlab.com/","handbook",{"text":277,"config":278},"Rapporti con gli investitori",{"href":279,"dataGaName":280,"dataGaLocation":63},"https://ir.gitlab.com/","investor relations",{"text":282,"config":283},"Sustainability",{"href":284,"dataGaName":282,"dataGaLocation":63},"/sustainability/",{"text":286,"config":287},"Diversità, inclusione e appartenenza (DIB)",{"href":288,"dataGaName":289,"dataGaLocation":63},"/diversity-inclusion-belonging/","Diversity, inclusion and belonging",{"text":291,"config":292},"Trust Center",{"href":293,"dataGaName":294,"dataGaLocation":63},"/it-it/security/","trust center",{"text":296,"config":297},"Newsletter",{"href":298,"dataGaName":299,"dataGaLocation":63},"/company/contact/","newsletter",{"text":301,"config":302},"Rassegna stampa",{"href":303,"dataGaName":304,"dataGaLocation":63},"/press/","press",{"text":306,"config":307},"Dichiarazione di trasparenza sulla schiavitù moderna",{"href":308,"dataGaName":309,"dataGaLocation":63},"https://handbook.gitlab.com/handbook/legal/modern-slavery-act-transparency-statement/","modern slavery transparency statement",{"title":311,"links":312},"Contattaci",[313,318,323,328,333,338,343],{"text":314,"config":315},"Contatta un esperto",{"href":316,"dataGaName":317,"dataGaLocation":63},"/it-it/sales/","sales",{"text":319,"config":320},"Richiedi assistenza",{"href":321,"dataGaName":322,"dataGaLocation":63},"/support/","get help",{"text":324,"config":325},"Portale clienti",{"href":326,"dataGaName":327,"dataGaLocation":63},"https://customers.gitlab.com/customers/sign_in/","customer portal",{"text":329,"config":330},"Stato",{"href":331,"dataGaName":332,"dataGaLocation":63},"https://status.gitlab.com/","status",{"text":334,"config":335},"Termini di utilizzo",{"href":336,"dataGaName":337,"dataGaLocation":63},"/terms/","terms of use",{"text":339,"config":340},"Informativa sulla privacy",{"href":341,"dataGaName":342,"dataGaLocation":63},"/it-it/privacy/","privacy statement",{"text":344,"config":345},"Preferenze dei cookie",{"dataGaName":346,"dataGaLocation":63,"id":347,"isOneTrustButton":20},"cookie preferences","ot-sdk-btn",{"items":349},[350,352,354],{"text":334,"config":351},{"href":336,"dataGaName":337,"dataGaLocation":63},{"text":339,"config":353},{"href":341,"dataGaName":342,"dataGaLocation":63},{"text":344,"config":355},{"dataGaName":346,"dataGaLocation":63,"id":347,"isOneTrustButton":20},"content:shared:it-it:main-footer.yml","Main Footer","shared/it-it/main-footer.yml","shared/it-it/main-footer",{"_path":361,"_dir":362,"_draft":6,"_partial":6,"_locale":7,"id":363,"visibility":20,"title":364,"button":365,"_id":369,"_type":48,"_source":49,"_file":370,"_stem":371,"_extension":52},"/shared/it-it/the-source/banner/the-economics-of-software-innovation-2025-08-18","banner","The Economics of Software Innovation","The Economics of Software Innovation—AI’s $750 Billion Opportunity",{"config":366,"text":368},{"href":367},"https://about.gitlab.com/software-innovation-report/","Get the research report","content:shared:it-it:the-source:banner:the-economics-of-software-innovation-2025-08-18.yml","shared/it-it/the-source/banner/the-economics-of-software-innovation-2025-08-18.yml","shared/it-it/the-source/banner/the-economics-of-software-innovation-2025-08-18",{"_path":373,"_dir":11,"_draft":6,"_partial":6,"_locale":7,"logo":374,"subscribeLink":379,"navItems":383,"_id":395,"_type":48,"title":396,"_source":49,"_file":397,"_stem":398,"_extension":52},"/shared/it-it/the-source/navigation",{"altText":375,"config":376},"the source logo",{"src":377,"href":378},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1750191004/t7wz1klfb2kxkezksv9t.svg","/it-it/the-source/",{"text":380,"config":381},"Iscriviti",{"href":382},"#subscribe",[384,388,391],{"text":385,"config":386},"Intelligenza artificiale",{"href":387},"/it-it/the-source/ai/",{"text":116,"config":389},{"href":390},"/it-it/the-source/security/",{"text":392,"config":393},"Piattaforma e infrastruttura",{"href":394},"/it-it/the-source/platform/","content:shared:it-it:the-source:navigation.yml","Navigation","shared/it-it/the-source/navigation.yml","shared/it-it/the-source/navigation",{"_path":400,"_dir":11,"_draft":6,"_partial":6,"_locale":7,"title":401,"description":402,"submitMessage":403,"formData":404,"_id":407,"_type":48,"_source":49,"_file":408,"_stem":409,"_extension":52},"/shared/it-it/the-source/newsletter","Newsletter di The Source","Rimani al passo con le ultime tendenze dello sviluppo software grazie a preziosi approfondimenti.","Hai effettuato l'iscrizione alla newsletter di The Source.",{"config":405},{"formId":406,"formName":299,"hideRequiredLabel":20},28469,"content:shared:it-it:the-source:newsletter.yml","shared/it-it/the-source/newsletter.yml","shared/it-it/the-source/newsletter",{"categoryNames":411},{"ai":385,"platform":392,"security":116},{"_path":413,"_dir":11,"_draft":6,"_partial":6,"_locale":7,"config":414,"seo":415,"content":417,"type":432,"slug":5,"_id":433,"_type":48,"title":7,"_source":49,"_file":434,"_stem":435,"_extension":52},"/it-it/the-source/security",{"layout":11},{"title":116,"description":416,"ogImage":7},"Scopri in che modo le organizzazioni possono assicurarsi di essere al passo con l'evoluzione delle minacce alla sicurezza e dei requisiti di conformità.",[418,424],{"componentName":419,"componentContent":420},"TheSourceCategoryHero",{"title":116,"description":416,"image":421},{"config":422},{"src":423},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463273/aplkxrvwpii26xao5yhi.png",{"componentName":425,"componentContent":426},"TheSourceCategoryMainSection",{"config":427},{"gatedAssets":428},[429,430,431],"source-lp-guide-to-dynamic-sboms","source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain","application-security-in-the-digital-age","category","content:it-it:the-source:security:index.yml","it-it/the-source/security/index.yml","it-it/the-source/security/index",{"_path":437,"_dir":438,"_draft":6,"_partial":6,"_locale":7,"config":439,"link":440,"_id":445,"_type":48,"title":446,"_source":49,"_file":447,"_stem":448,"_extension":52},"/shared/it-it/the-source/gated-assets/source-lp-how-a-devsecops-platform-drives-business-success-the-complete-guide","gated-assets",{"id":15},{"config":441},{"href":442,"dataGaName":443,"dataGaLocation":444},"https://about.gitlab.com/the-source/platform/how-a-devsecops-platform-drives-business-success/","Driving Business Success with DevSecOps","thesource","content:shared:it-it:the-source:gated-assets:source-lp-how-a-devsecops-platform-drives-business-success-the-complete-guide.yml","Source Lp How A Devsecops Platform Drives Business Success The Complete Guide","shared/it-it/the-source/gated-assets/source-lp-how-a-devsecops-platform-drives-business-success-the-complete-guide.yml","shared/it-it/the-source/gated-assets/source-lp-how-a-devsecops-platform-drives-business-success-the-complete-guide",{"_path":413,"_dir":11,"_draft":6,"_partial":6,"_locale":7,"config":450,"seo":451,"content":452,"type":432,"slug":5,"_id":433,"_type":48,"title":7,"_source":49,"_file":434,"_stem":435,"_extension":52},{"layout":11},{"title":116,"description":416,"ogImage":7},[453,457],{"componentName":419,"componentContent":454},{"title":116,"description":416,"image":455},{"config":456},{"src":423},{"componentName":425,"componentContent":458},{"config":459},{"gatedAssets":460},[429,430,431],[462,476,487],{"_path":463,"_dir":438,"_draft":6,"_partial":6,"_locale":7,"config":464,"title":466,"description":467,"link":468,"_id":473,"_type":48,"_source":49,"_file":474,"_stem":475,"_extension":52},"/shared/it-it/the-source/gated-assets/application-security-in-the-digital-age",{"id":431,"formId":465},1002,"Sicurezza delle applicazioni nell'era digitale","Leggi i [risultati del sondaggio condotto tra oltre 5.000 professionisti di DevSecOps in tutto il mondo](https://about.gitlab.com/developer-survey/2024/security-compliance/) per scoprire come le organizzazioni affrontano l'aumento delle superfici di attacco e come sta cambiando l'atteggiamento nei confronti della sicurezza e dell'IA.",{"text":469,"config":470},"Leggi il report",{"href":471,"dataGaName":472,"dataGaLocation":444},"https://about.gitlab.com/developer-survey/2024/security-compliance","Application Security in the Digital Age","content:shared:it-it:the-source:gated-assets:application-security-in-the-digital-age.yml","shared/it-it/the-source/gated-assets/application-security-in-the-digital-age.yml","shared/it-it/the-source/gated-assets/application-security-in-the-digital-age",{"_path":477,"_dir":438,"_draft":6,"_partial":6,"_locale":7,"config":478,"title":479,"link":480,"_id":484,"_type":48,"_source":49,"_file":485,"_stem":486,"_extension":52},"/shared/it-it/the-source/gated-assets/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain",{"id":430},"Guida pratica ai veicoli di minacce nella catena di fornitura del software",{"config":481},{"href":482,"dataGaName":483,"dataGaLocation":444},"https://about.gitlab.com/the-source/security/field-guide-to-threat-vectors-in-the-software-supply-chain/","A field guide to threat vectors in the software supply chain","content:shared:it-it:the-source:gated-assets:source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain.yml","shared/it-it/the-source/gated-assets/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain.yml","shared/it-it/the-source/gated-assets/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain",{"_path":488,"_dir":438,"_draft":6,"_partial":6,"_locale":7,"config":489,"title":490,"description":491,"link":492,"_id":497,"_type":48,"_source":49,"_file":498,"_stem":499,"_extension":52},"/shared/it-it/the-source/gated-assets/source-lp-guide-to-dynamic-sboms",{"id":429},"Guida GitLab alle SBOM dinamiche: un elemento integrante dello sviluppo del software moderno","Scopri come avere visibilità sui rischi organizzativi precedentemente non identificati con una distinta base software (SBOM).",{"text":493,"config":494},"Leggi la guida",{"href":495,"dataGaName":496,"dataGaLocation":444},"https://about.gitlab.com/the-source/security/guide-to-dynamic-sboms/","Guide to Dynamic SBOMs","content:shared:it-it:the-source:gated-assets:source-lp-guide-to-dynamic-sboms.yml","shared/it-it/the-source/gated-assets/source-lp-guide-to-dynamic-sboms.yml","shared/it-it/the-source/gated-assets/source-lp-guide-to-dynamic-sboms",[501,524,540,556,572,593,613,629,647,667,684,705,721,739,756,774,793,811,830,850,871,887,903,921,939,958,974,992,1008,1027],{"_path":502,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":504,"seo":505,"content":507,"type":519,"slug":520,"_id":521,"_type":48,"title":506,"_source":49,"_file":522,"_stem":523,"_extension":52},"/it-it/the-source/authors/amanda-rueda","authors",{"layout":11},{"title":506},"Amanda Rueda",[508,517],{"componentName":509,"componentContent":510},"TheSourceAuthorHero",{"config":511,"name":506,"headshot":514},{"gitlabHandle":512,"linkedInProfileUrl":513},"amandarueda","https://www.linkedin.com/in/amandamrueda/",{"altText":506,"config":515},{"src":516},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463383/osecw1pzbxvb7fhqhiky.png",{"componentName":518},"TheSourceArticlesList","author","amanda-rueda","content:it-it:the-source:authors:amanda-rueda.yml","it-it/the-source/authors/amanda-rueda.yml","it-it/the-source/authors/amanda-rueda",{"_path":525,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":526,"seo":527,"content":529,"type":519,"slug":536,"_id":537,"_type":48,"title":528,"_source":49,"_file":538,"_stem":539,"_extension":52},"/it-it/the-source/authors/andre-michael-braun",{"layout":11},{"title":528},"Andre Michael Braun",[530,535],{"componentName":509,"componentContent":531},{"name":528,"headshot":532},{"altText":528,"config":533},{"src":534},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463336/yl27k7wdlnkzsizwknn1.jpg",{"componentName":518},"andre-michael-braun","content:it-it:the-source:authors:andre-michael-braun.yml","it-it/the-source/authors/andre-michael-braun.yml","it-it/the-source/authors/andre-michael-braun",{"_path":541,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":542,"seo":543,"content":545,"type":519,"slug":552,"_id":553,"_type":48,"title":544,"_source":49,"_file":554,"_stem":555,"_extension":52},"/it-it/the-source/authors/andrew-haschka",{"layout":11},{"title":544},"Andrew Haschka",[546,551],{"componentName":509,"componentContent":547},{"name":544,"headshot":548},{"altText":544,"config":549},{"src":550},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463349/z1qnc4uxmqgg3hnm3da4.png",{"componentName":518},"andrew-haschka","content:it-it:the-source:authors:andrew-haschka.yml","it-it/the-source/authors/andrew-haschka.yml","it-it/the-source/authors/andrew-haschka",{"_path":557,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":558,"seo":559,"content":561,"type":519,"slug":568,"_id":569,"_type":48,"title":560,"_source":49,"_file":570,"_stem":571,"_extension":52},"/it-it/the-source/authors/ayoub-fandi",{"layout":11},{"title":560},"Ayoub Fandi",[562,567],{"componentName":509,"componentContent":563},{"name":560,"headshot":564},{"altText":560,"config":565},{"src":566},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463329/wyp554loeyoibx3ozren.jpg",{"componentName":518},"ayoub-fandi","content:it-it:the-source:authors:ayoub-fandi.yml","it-it/the-source/authors/ayoub-fandi.yml","it-it/the-source/authors/ayoub-fandi",{"_path":573,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":574,"seo":575,"content":577,"type":519,"slug":589,"_id":590,"_type":48,"title":576,"_source":49,"_file":591,"_stem":592,"_extension":52},"/it-it/the-source/authors/brian-wald",{"layout":11},{"title":576},"Brian Wald",[578,588],{"componentName":509,"componentContent":579},{"config":580,"name":576,"role":583,"bio":584,"headshot":585},{"gitlabHandle":581,"linkedInProfileUrl":582},"brianwald","https://www.linkedin.com/in/brianwald/","Head of Global Field CTO org","Brian Wald ricopre il ruolo di Head of Global Field CTO org presso GitLab. Guida un team dinamico di direttori tecnici che lavorano a stretto contatto con le aziende per aiutarle a trasformarne le pratiche di sviluppo software.",{"altText":576,"config":586},{"src":587},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463417/fugpbux9miqbdx3wewtu.jpg",{"componentName":518},"brian-wald","content:it-it:the-source:authors:brian-wald.yml","it-it/the-source/authors/brian-wald.yml","it-it/the-source/authors/brian-wald",{"_path":594,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":595,"seo":596,"content":598,"type":519,"slug":609,"_id":610,"_type":48,"title":597,"_source":49,"_file":611,"_stem":612,"_extension":52},"/it-it/the-source/authors/bryan-ross",{"layout":11},{"title":597},"Bryan Ross",[599,608],{"componentName":509,"componentContent":600},{"config":601,"name":597,"headshot":605},{"gitlabHandle":602,"twitterXProfileUrl":603,"linkedInProfileUrl":604},"bryanrossuk","https://twitter.com/bryanrossuk","https://www.linkedin.com/in/bryanross",{"altText":597,"config":606},{"src":607},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463324/mvdyvskii4hltdrgqxom.jpg",{"componentName":518},"bryan-ross","content:it-it:the-source:authors:bryan-ross.yml","it-it/the-source/authors/bryan-ross.yml","it-it/the-source/authors/bryan-ross",{"_path":614,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":615,"seo":616,"content":618,"type":519,"slug":625,"_id":626,"_type":48,"title":617,"_source":49,"_file":627,"_stem":628,"_extension":52},"/it-it/the-source/authors/chandler-gibbons",{"layout":11},{"title":617},"Chandler Gibbons",[619,624],{"componentName":509,"componentContent":620},{"name":617,"headshot":621},{"altText":617,"config":622},{"src":623},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463362/o7g9fqtqtjvegfwniuxh.jpg",{"componentName":518},"chandler-gibbons","content:it-it:the-source:authors:chandler-gibbons.yml","it-it/the-source/authors/chandler-gibbons.yml","it-it/the-source/authors/chandler-gibbons",{"_path":630,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":631,"seo":632,"content":634,"type":519,"slug":643,"_id":644,"_type":48,"title":633,"_source":49,"_file":645,"_stem":646,"_extension":52},"/it-it/the-source/authors/dave-steer",{"layout":11},{"title":633},"Dave Steer",[635,642],{"componentName":509,"componentContent":636},{"config":637,"name":633,"headshot":639},{"gitlabHandle":638},"dsteer",{"altText":633,"config":640},{"src":641},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463457/zbtapdkglu3yb9suaq7w.png",{"componentName":518},"dave-steer","content:it-it:the-source:authors:dave-steer.yml","it-it/the-source/authors/dave-steer.yml","it-it/the-source/authors/dave-steer",{"_path":648,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":649,"seo":650,"content":652,"type":519,"slug":662,"_id":663,"_type":48,"title":664,"_source":49,"_file":665,"_stem":666,"_extension":52},"/it-it/the-source/authors/ddesanto",{"layout":11},{"title":651},"David DeSanto",[653,661],{"componentName":509,"componentContent":654},{"config":655,"name":651,"headshot":658},{"gitlabHandle":656,"linkedInProfileUrl":657},"david","https://www.linkedin.com/in/ddesanto/",{"altText":651,"config":659},{"src":660},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463446/bgnljs84zcsxj0t6nvix.png",{"componentName":518},"ddesanto","content:it-it:the-source:authors:ddesanto.yml","Ddesanto","it-it/the-source/authors/ddesanto.yml","it-it/the-source/authors/ddesanto",{"_path":668,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":669,"seo":670,"content":672,"type":519,"slug":679,"_id":680,"_type":48,"title":681,"_source":49,"_file":682,"_stem":683,"_extension":52},"/it-it/the-source/authors/derek-debellis",{"layout":11},{"title":671},"Derek DeBellis",[673,678],{"componentName":509,"componentContent":674},{"name":671,"headshot":675},{"altText":671,"config":676},{"src":677},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463385/sbnjwfaguszi5g2smzr7.png",{"componentName":518},"derek-debellis","content:it-it:the-source:authors:derek-debellis.yml","Derek Debellis","it-it/the-source/authors/derek-debellis.yml","it-it/the-source/authors/derek-debellis",{"_path":685,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":686,"seo":687,"content":689,"type":519,"slug":701,"_id":702,"_type":48,"title":688,"_source":49,"_file":703,"_stem":704,"_extension":52},"/it-it/the-source/authors/emilio-salvador",{"layout":11},{"title":688},"Emilio Salvador",[690,700],{"componentName":509,"componentContent":691},{"config":692,"name":688,"role":695,"bio":696,"headshot":697},{"gitlabHandle":693,"linkedInProfileUrl":694},"esalvadorp","https://www.linkedin.com/in/emiliosp/","Vicepresidente, Strategia e Relazioni con gli sviluppatori","Emilio Salvador è vicepresidente della strategia e delle relazioni con gli sviluppatori presso GitLab. Dirigente del settore tecnologico con oltre 20 anni di esperienza, Emilio ha ricoperto ruoli in Amazon e Microsoft e, più di recente, ha guidato la strategia e le operazioni per il team Developer Advocacy and Experience di Google. Ha conseguito un MBA presso la MIT Sloan School of Management.",{"altText":688,"config":698},{"src":699},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463402/g0snp3uisjm4tj3pkqcw.jpg",{"componentName":518},"emilio-salvador","content:it-it:the-source:authors:emilio-salvador.yml","it-it/the-source/authors/emilio-salvador.yml","it-it/the-source/authors/emilio-salvador",{"_path":706,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":707,"seo":708,"content":710,"type":519,"slug":717,"_id":718,"_type":48,"title":709,"_source":49,"_file":719,"_stem":720,"_extension":52},"/it-it/the-source/authors/erika-feldman",{"layout":11},{"title":709},"Erika Feldman",[711,716],{"componentName":509,"componentContent":712},{"name":709,"headshot":713},{"altText":709,"config":714},{"src":715},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463354/d9quqvz7d2ayjwif7vdn.png",{"componentName":518},"erika-feldman","content:it-it:the-source:authors:erika-feldman.yml","it-it/the-source/authors/erika-feldman.yml","it-it/the-source/authors/erika-feldman",{"_path":722,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":723,"seo":724,"content":726,"type":519,"slug":735,"_id":736,"_type":48,"title":725,"_source":49,"_file":737,"_stem":738,"_extension":52},"/it-it/the-source/authors/george-kichukov",{"layout":11},{"title":725},"George Kichukov",[727,734],{"componentName":509,"componentContent":728},{"config":729,"name":725,"headshot":731},{"gitlabHandle":730},"gkichukov",{"altText":725,"config":732},{"src":733},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463366/dk2knfancgsxocjkmyoa.jpg",{"componentName":518},"george-kichukov","content:it-it:the-source:authors:george-kichukov.yml","it-it/the-source/authors/george-kichukov.yml","it-it/the-source/authors/george-kichukov",{"_path":740,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":741,"seo":742,"content":744,"type":519,"slug":751,"_id":752,"_type":48,"title":753,"_source":49,"_file":754,"_stem":755,"_extension":52},"/it-it/the-source/authors/gitlab",{"layout":11},{"title":743},"GitLab",[745,750],{"componentName":509,"componentContent":746},{"name":743,"headshot":747},{"altText":743,"config":748},{"src":749},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463461/ts7io0hgpdyqylbzfire.png",{"componentName":518},"gitlab","content:it-it:the-source:authors:gitlab.yml","Gitlab","it-it/the-source/authors/gitlab.yml","it-it/the-source/authors/gitlab",{"_path":757,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":758,"seo":759,"content":761,"type":519,"slug":770,"_id":771,"_type":48,"title":760,"_source":49,"_file":772,"_stem":773,"_extension":52},"/it-it/the-source/authors/grant-hickman",{"layout":11},{"title":760},"Grant Hickman",[762,769],{"componentName":509,"componentContent":763},{"config":764,"name":760,"headshot":766},{"gitlabHandle":765},"g.hickman",{"altText":760,"config":767},{"src":768},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463463/f3uqwtugqotyhwutz5gu.png",{"componentName":518},"grant-hickman","content:it-it:the-source:authors:grant-hickman.yml","it-it/the-source/authors/grant-hickman.yml","it-it/the-source/authors/grant-hickman",{"_path":775,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":776,"seo":777,"content":779,"type":519,"slug":789,"_id":790,"_type":48,"title":778,"_source":49,"_file":791,"_stem":792,"_extension":52},"/it-it/the-source/authors/haim-snir",{"layout":11},{"title":778},"Haim Snir",[780,788],{"componentName":509,"componentContent":781},{"config":782,"name":778,"headshot":785},{"gitlabHandle":783,"linkedInProfileUrl":784},"hsnir1","https://www.linkedin.com/in/haimsnir/",{"altText":778,"config":786},{"src":787},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463395/nubmshvaq8wpomopllni.png",{"componentName":518},"haim-snir","content:it-it:the-source:authors:haim-snir.yml","it-it/the-source/authors/haim-snir.yml","it-it/the-source/authors/haim-snir",{"_path":794,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":795,"seo":796,"content":798,"type":519,"slug":802,"_id":807,"_type":48,"title":808,"_source":49,"_file":809,"_stem":810,"_extension":52},"/it-it/the-source/authors/iganbaruch",{"layout":11},{"title":797},"Itzik Gan Baruch",[799,806],{"componentName":509,"componentContent":800},{"config":801,"name":797,"headshot":803},{"gitlabHandle":802},"iganbaruch",{"altText":797,"config":804},{"src":805},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463443/vibb2fkc0ojni2d1eqde.png",{"componentName":518},"content:it-it:the-source:authors:iganbaruch.yml","Iganbaruch","it-it/the-source/authors/iganbaruch.yml","it-it/the-source/authors/iganbaruch",{"_path":812,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":813,"seo":814,"content":816,"type":519,"slug":825,"_id":826,"_type":48,"title":827,"_source":49,"_file":828,"_stem":829,"_extension":52},"/it-it/the-source/authors/jlongo",{"layout":11},{"title":815},"Joseph Longo",[817,824],{"componentName":509,"componentContent":818},{"config":819,"name":815,"headshot":821},{"gitlabHandle":820},"jlongo_gitlab",{"altText":815,"config":822},{"src":823},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463434/uoxaknpmoposbbgzqji8.png",{"componentName":518},"jlongo","content:it-it:the-source:authors:jlongo.yml","Jlongo","it-it/the-source/authors/jlongo.yml","it-it/the-source/authors/jlongo",{"_path":831,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":832,"seo":833,"content":835,"type":519,"slug":14,"_id":847,"_type":48,"title":834,"_source":49,"_file":848,"_stem":849,"_extension":52},"/it-it/the-source/authors/joel-krooswyk",{"layout":11},{"title":834},"Joel Krooswyk",[836,846],{"componentName":509,"componentContent":837},{"config":838,"name":834,"role":841,"bio":842,"headshot":843},{"gitlabHandle":839,"linkedInProfileUrl":840},"jkrooswyk","https://www.linkedin.com/in/joelrkrooswyk/","CTO federale","Joel Krooswyk è il CTO federale di GitLab. Joel è attivamente coinvolto nella crescita di GitLab dal 2017. Nei suoi 25 anni di esperienza in posizioni di responsabilità ha operato sia nel settore pubblico degli Stati Uniti, che in piccole e medie imprese a livello internazionale. Joel combina una profonda esperienza nelle politiche governative con una vasta esperienza nei settori tecnologia, sviluppo software, intelligenza artificiale e sicurezza informatica. Viene spesso interpellato dalle aziende del settore e dalle agenzie per fornire commenti e risposte sulle politiche adottate.",{"altText":834,"config":844},{"src":845},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463423/mkmdhuxsjggfvokdmdv7.jpg",{"componentName":518},"content:it-it:the-source:authors:joel-krooswyk.yml","it-it/the-source/authors/joel-krooswyk.yml","it-it/the-source/authors/joel-krooswyk",{"_path":851,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":852,"seo":853,"content":855,"type":519,"slug":867,"_id":868,"_type":48,"title":854,"_source":49,"_file":869,"_stem":870,"_extension":52},"/it-it/the-source/authors/josh-lemos",{"layout":11},{"title":854},"Josh Lemos",[856,866],{"componentName":509,"componentContent":857},{"config":858,"name":854,"role":861,"bio":862,"headshot":863},{"gitlabHandle":859,"linkedInProfileUrl":860},"joshlemos","https://www.linkedin.com/in/joshlemos/","Chief Information Security Officer","Con venti anni di esperienza alla guida di team di sicurezza delle informazioni, Josh Lemos è il Chief Information Security Officer di GitLab Inc. Il suo compito è definire e portare avanti la visione, le strategie e i programmi dell'azienda per fare in modo che le risorse e le tecnologie informative siano salvaguardate nel migliore dei modi, rafforzando la piattaforma DevSecOps di GitLab e offrendo ai clienti il massimo livello di sicurezza.",{"altText":854,"config":864},{"src":865},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463405/f4rqtiecakrekvxfhqar.jpg",{"componentName":518},"josh-lemos","content:it-it:the-source:authors:josh-lemos.yml","it-it/the-source/authors/josh-lemos.yml","it-it/the-source/authors/josh-lemos",{"_path":872,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":873,"seo":874,"content":876,"type":519,"slug":883,"_id":884,"_type":48,"title":875,"_source":49,"_file":885,"_stem":886,"_extension":52},"/it-it/the-source/authors/julie-griffin",{"layout":11},{"title":875},"Julie Griffin",[877,882],{"componentName":509,"componentContent":878},{"name":875,"headshot":879},{"altText":875,"config":880},{"src":881},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463371/hqkbr3uk8hw2de7tltn4.webp",{"componentName":518},"julie-griffin","content:it-it:the-source:authors:julie-griffin.yml","it-it/the-source/authors/julie-griffin.yml","it-it/the-source/authors/julie-griffin",{"_path":888,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":889,"seo":890,"content":892,"type":519,"slug":899,"_id":900,"_type":48,"title":891,"_source":49,"_file":901,"_stem":902,"_extension":52},"/it-it/the-source/authors/kristina-weis",{"layout":11},{"title":891},"Kristina Weis",[893,898],{"componentName":509,"componentContent":894},{"name":891,"headshot":895},{"altText":891,"config":896},{"src":897},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463469/eoolq6n6bs0zb8gmf0js.webp",{"componentName":518},"kristina-weis","content:it-it:the-source:authors:kristina-weis.yml","it-it/the-source/authors/kristina-weis.yml","it-it/the-source/authors/kristina-weis",{"_path":904,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":905,"seo":906,"content":908,"type":519,"slug":917,"_id":918,"_type":48,"title":907,"_source":49,"_file":919,"_stem":920,"_extension":52},"/it-it/the-source/authors/lee-faus",{"layout":11},{"title":907},"Lee Faus",[909,916],{"componentName":509,"componentContent":910},{"config":911,"name":907,"headshot":913},{"gitlabHandle":912},"lfaus",{"altText":907,"config":914},{"src":915},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463398/vivhlomglvnstamj54bo.jpg",{"componentName":518},"lee-faus","content:it-it:the-source:authors:lee-faus.yml","it-it/the-source/authors/lee-faus.yml","it-it/the-source/authors/lee-faus",{"_path":922,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":923,"seo":924,"content":926,"type":519,"slug":930,"_id":935,"_type":48,"title":936,"_source":49,"_file":937,"_stem":938,"_extension":52},"/it-it/the-source/authors/ncregan",{"layout":11},{"title":925},"Niall Cregan",[927,934],{"componentName":509,"componentContent":928},{"config":929,"name":925,"headshot":931},{"gitlabHandle":930},"ncregan",{"altText":925,"config":932},{"src":933},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463431/yrtwodocb4cu3j7lkhyo.png",{"componentName":518},"content:it-it:the-source:authors:ncregan.yml","Ncregan","it-it/the-source/authors/ncregan.yml","it-it/the-source/authors/ncregan",{"_path":940,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":941,"seo":942,"content":944,"type":519,"slug":953,"_id":954,"_type":48,"title":955,"_source":49,"_file":956,"_stem":957,"_extension":52},"/it-it/the-source/authors/rschulman",{"layout":11},{"title":943},"Robin Schulman",[945,952],{"componentName":509,"componentContent":946},{"config":947,"name":943,"headshot":949},{"gitlabHandle":948},"robin",{"altText":943,"config":950},{"src":951},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463437/u2xfbudw1f8hhnkrgaoy.webp",{"componentName":518},"rschulman","content:it-it:the-source:authors:rschulman.yml","Rschulman","it-it/the-source/authors/rschulman.yml","it-it/the-source/authors/rschulman",{"_path":959,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":960,"seo":961,"content":963,"type":519,"slug":970,"_id":971,"_type":48,"title":962,"_source":49,"_file":972,"_stem":973,"_extension":52},"/it-it/the-source/authors/sabrina-farmer",{"layout":11},{"title":962},"Sabrina Farmer",[964,969],{"componentName":509,"componentContent":965},{"name":962,"headshot":966},{"altText":962,"config":967},{"src":968},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463377/udmzbjjr5xrcrffdlphx.webp",{"componentName":518},"sabrina-farmer","content:it-it:the-source:authors:sabrina-farmer.yml","it-it/the-source/authors/sabrina-farmer.yml","it-it/the-source/authors/sabrina-farmer",{"_path":975,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":976,"seo":977,"content":979,"type":519,"slug":988,"_id":989,"_type":48,"title":978,"_source":49,"_file":990,"_stem":991,"_extension":52},"/it-it/the-source/authors/sandra-gittlen",{"layout":11},{"title":978},"Sandra Gittlen",[980,987],{"componentName":509,"componentContent":981},{"config":982,"name":978,"headshot":984},{"gitlabHandle":983},"sgittlen",{"altText":978,"config":985},{"src":986},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463466/r7ckb9h2zr4c2rsz3zlm.png",{"componentName":518},"sandra-gittlen","content:it-it:the-source:authors:sandra-gittlen.yml","it-it/the-source/authors/sandra-gittlen.yml","it-it/the-source/authors/sandra-gittlen",{"_path":993,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":994,"seo":995,"content":997,"type":519,"slug":1004,"_id":1005,"_type":48,"title":996,"_source":49,"_file":1006,"_stem":1007,"_extension":52},"/it-it/the-source/authors/sharon-gaudin",{"layout":11},{"title":996},"Sharon Gaudin",[998,1003],{"componentName":509,"componentContent":999},{"name":996,"headshot":1000},{"altText":996,"config":1001},{"src":1002},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463475/h6j4nnvykzyfzgvl7txb.webp",{"componentName":518},"sharon-gaudin","content:it-it:the-source:authors:sharon-gaudin.yml","it-it/the-source/authors/sharon-gaudin.yml","it-it/the-source/authors/sharon-gaudin",{"_path":1009,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":1010,"seo":1011,"content":1013,"type":519,"slug":1023,"_id":1024,"_type":48,"title":1012,"_source":49,"_file":1025,"_stem":1026,"_extension":52},"/it-it/the-source/authors/stephen-walters",{"layout":11},{"title":1012},"Stephen Walters",[1014,1022],{"componentName":509,"componentContent":1015},{"config":1016,"name":1012,"headshot":1019},{"gitlabHandle":1017,"linkedInProfileUrl":1018},"swalters1","https://www.linkedin.com/in/1stephenwalters/",{"altText":1012,"config":1020},{"src":1021},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463392/g6ktk5qb4vcqc9wqjlf9.jpg",{"componentName":518},"stephen-walters","content:it-it:the-source:authors:stephen-walters.yml","it-it/the-source/authors/stephen-walters.yml","it-it/the-source/authors/stephen-walters",{"_path":1028,"_dir":503,"_draft":6,"_partial":6,"_locale":7,"config":1029,"seo":1030,"content":1032,"type":519,"slug":1044,"_id":1045,"_type":48,"title":1046,"_source":49,"_file":1047,"_stem":1048,"_extension":52},"/it-it/the-source/authors/taylor-mccaslin",{"layout":11},{"title":1031},"Taylor McCaslin",[1033,1043],{"componentName":509,"componentContent":1034},{"config":1035,"name":1031,"role":1038,"bio":1039,"headshot":1040},{"gitlabHandle":1036,"linkedInProfileUrl":1037},"tmccaslin","https://www.linkedin.com/in/taylormccaslin/","Responsabile di gruppo, Prodotto - Data science","Taylor McCaslin svolge il ruolo di Product Lead per l'IA e il ML presso GitLab e dirige un team composto da product manager incaricato di gestire processi, pratiche e strumenti legati all'operatività dei modelli di intelligenza artificiale e machine learning. Inoltre, ha il compito di definire una visione chiara e strategica che permetta agli utenti di GitLab di sfruttare la scienza dei dati nell'ambito dei loro programmi DevOps. Prima di entrare in GitLab ha lavorato per Indeed, Duo Security e WP Engine.",{"altText":1031,"config":1041},{"src":1042},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463427/trfasilaeasosxfcxmsm.jpg",{"componentName":518},"taylor-mccaslin","content:it-it:the-source:authors:taylor-mccaslin.yml","Taylor Mccaslin","it-it/the-source/authors/taylor-mccaslin.yml","it-it/the-source/authors/taylor-mccaslin",1758326300436]