Monthly Roundup - January 2025
As we kick off 2025, we have some exciting updates at In Check Software. This month, we are actively looking for TypeScript engineers on behalf of one of our clients
Edward is the technical lead at In Check Software. He enjoys functional programming, JavaScript, automation and all aspects of software development.
As we kick off 2025, we have some exciting updates at In Check Software. This month, we are actively looking for TypeScript engineers on behalf of one of our clients
We are partnering with a key player in the technology sector to find an exceptional Senior Java Developer for a full-time, contractor position. This is a unique opportunity to join
Machine learning (ML) and artificial intelligence have revolutionised the world, enabling organisations to improve their processes, products, and services massively. To stay competitive in this rapidly evolving landscape, companies need
Surprisingly normal behaviour in enterprise software development is to allow arbitrary code to run on local systems and production servers that no one in your organisation has reviewed or verified
A software supply chain attack is when a third-party actor infiltrates your systems by somehow getting their own malicious code into your applications without you even knowing. So how do
The best developers are always constantly reading about state-of-the-art technologies, systems and designs that they can use and incorporate into their own projects. But software architecture is never one-size-fits-all. The
Millions of developers worldwide use git to manage software projects, but improper use can leave your systems vulnerable to attack. Developers use the services from Companies like GitHub, GitLab and
If you find yourself connecting to the same servers over and over again, an SSH config file will save you time and energy. Basic Usage Let's consider a
The serverless framework is a popular development tool to allow developers to quickly and easily create applications without worrying about infrastructure and other network management. Enterprise organisations typically develop multiple
From time to time, I like to remind myself how insecure our systems are and check out the latest Google Dorks in the Exploit Database. If you ever wanted some
My advice to any company looking to improve their security is to run a simulated social engineering attack on their staff before even thinking about anything else. In a study
Cross-site request forgery (CSRF) is the practice of tricking a user into inadvertently issuing an HTTP request to another website without the user's knowledge - often with malicious