content
"}},Qt={element:"span",mutate:function(e){e.setAttribute("style","display: -webkit-flex; display: -ms-flexbox; display: flex;"),e.innerHTML='hello'}},Yt={element:"form",mutate:function(e){e.setAttribute("tabindex",0),e.setAttribute("disabled","disabled")}},en={element:"a",mutate:function(e){return e.href="#void",e.innerHTML='content
",e.firstElementChild}},xn=function(e){if(!e.ownerSVGElement&&"svg"!==e.nodeName.toLowerCase())return!1;var t=s();e.appendChild(t);var n=t.querySelector("input");return n.focus(),n.disabled=!0,e.removeChild(t),!0},yn={element:"div",mutate:function(e){return e.innerHTML=c('What’s it like working day and night to kill spam, Bitcoin mining, malware and more? Meet our security team.
Where does today's tech transformation leave tomorrow's security compliance? A senior security analyst tackles the question.
What’s it like working to secure one of the most transparent organizations in the world? Meet our security team.
Independent vs aggregate? Determining the most effective security controls approach for any organization has many considerations.
Four months since going public with our bug bounty program, we dive into where we’re at, what success looks like, and what to expect down the road.
How I learned to iterate quickly during my first week at GitLab.
A closer look at GitLab’s security scanning tools and the HIPAA risk analysis.
Find out which plan works best for your team
Learn about pricingLearn about what GitLab can do for your team
Talk to an expert