Learning

Learn secure development workflows

Practical guides for developers, AppSec, and platform teams.

Showing 20 of 36 resources

CI/CD Security Guide: Best Practices for Secure Pipelines

A platform-agnostic CI/CD security guide covering tokens, secrets, OIDC, runners, artifacts, caches, release workflows, scanning, and Corgea.

Corgea Security Team Corgea Security Team
intermediate • 8 min read
CI/CD SecurityDevSecOpsSupply Chain Security

C# Security Best Practices

A practical C# and .NET security guide covering ASP.NET Core validation, authorization, EF Core, secrets, NuGet risk, and Corgea scanning.

Corgea Security Team Corgea Security Team
intermediate • 7 min read
C#.NETASP.NET Core

Docker Security Best Practices

A 2026 Docker security guide covering image hardening, non-root containers, secrets, SBOMs, Compose, runtime controls, CI/CD scanning, and Corgea.

Corgea Security Team Corgea Security Team
intermediate • 7 min read
DockerContainer SecuritySupply Chain Security

Kubernetes Security Checklist 2026

A practical Kubernetes security checklist for 2026 covering RBAC, Pod Security, network policies, secrets, images, admission controls, IaC, and Corgea scanning.

Corgea Security Team Corgea Security Team
intermediate • 7 min read
KubernetesContainer SecurityCloud Security

Node.js Security Best Practices 2026

A practical Node.js security checklist for 2026 covering validation, auth, npm dependencies, secrets, Express hardening, CI/CD, and Corgea scanning.

Corgea Security Team Corgea Security Team
intermediate • 8 min read
Node.jsJavaScriptApplication Security

PHP Security Best Practices

A modern PHP security checklist covering input validation, PDO, sessions, file uploads, Composer dependencies, secrets, frameworks, and Corgea scanning.

Corgea Security Team Corgea Security Team
beginner • 7 min read
PHPWeb SecuritySecure Coding

Terraform Security Best Practices

A practical Terraform security guide covering state protection, secrets, provider pinning, module trust, cloud IAM, policy-as-code, CI/CD, and Corgea IaC scanning.

Corgea Security Team Corgea Security Team
intermediate • 7 min read
TerraformInfrastructure as CodeCloud Security

GitHub Actions Security Checklist for Supply Chain Attacks

Use this GitHub Actions security checklist to lock down workflow permissions, secrets, third-party actions, runners, artifacts, and release pipelines after recent CI/CD supply chain attacks.

Ahmad Ahmad
intermediate • 10 min read
GitHub ActionsCI/CD SecuritySupply Chain Security

What Is SAST? Static Application Security Testing Explained

Learn what SAST stands for, what it means, how static application security testing works, what vulnerabilities it finds, and how to implement it effectively in your SDLC.

Corgea Security Team Corgea Security Team
beginner • 20 min read
sastapplication-securitystatic-analysis

Best SAST Tools in 2026: Compared & Ranked

Compare the 10 best SAST tools in 2026 side by side. Includes feature matrix, AI capabilities, false-positive rates, language support, and guidance on choosing the right static analysis tool for your team.

Corgea Security Team Corgea Security Team
beginner • 17 min read
sastapplication-securitystatic-analysis

Must-Have Cursor Rules for TypeScript Developers

A practical set of Cursor rules for TypeScript teams that helps block unsafe code patterns, secret leaks, missing auth checks, and other common security mistakes.

Ahmad Ahmad
beginner • 7 min read

All You Need to Know About DAST in 2025 - Comprehensive Guide

Dynamic Application Security Testing (DAST) is a black-box security testing technique that evaluates a web application while it is running. Instead of analyzing source code, DAS...

Ahmad Ahmad
beginner • 3 min read

Angular Security Best Practices 2025

Angular is one of the most widely used frameworks for building modern web applications. But with its popularity comes increased attention from attackers. A single overlooked vul...

Ahmad Ahmad
beginner • 4 min read

Credential Stuffing

In the rapidly evolving digital landscape, businesses grapple with a myriad of cybersecurity threats. Among these, credential stuffing emerges as a serious challenge, especially...

Ahmad Ahmad
beginner • 3 min read

Denial of Service Attacks

A Denial of Service (DoS) attack is when an attacker tries disrupting the normal functioning of a targeted server, service, or network. The primary goal is to make the targeted...

Ahmad Ahmad
beginner • 3 min read

Django Security Best Practices: A Comprehensive Guide for Software Engineers

Django, the robust and versatile Python web framework, is a favorite among developers for its "batteries-included" philosophy. However, with great power comes great responsibili...

Ahmad Ahmad
beginner • 5 min read

Security Teams: Don't fall for this LLM trap

I'm Ahmad, the founder of Corgea. We're building an application security platform that automatically finds, triages, and fixes insecure code. Corgea uncovers vulnerabilities oth...

Ahmad Ahmad
beginner • 4 min read

Express JS Security Best Practices 2025

Express is one of the most popular Node.js frameworks and is used by thousands of APIs and applications globally. In 2025, the security landscape has evolved – from sophisticate...

Ahmad Ahmad
beginner • 7 min read

Don’t Sh*t-Left: How to Actually Shift-Left Without Failing Your AppSec Program

"Shift-left" has become a rallying cry in application security: identify vulnerabilities early, empower developers to fix them, and save time and money. But in practice, shift-l...

Ahmad Ahmad
beginner • 12 min read

Flask Security Best Practices 2025

Flask is a popular lightweight web framework for Python, but its flexibility means developers must take extra care to secure their applications. Web threats like Cross-Site Scri...

Ahmad Ahmad
beginner • 19 min read