Ayal Yogev
Los Altos, California, United States
9K followers
500+ connections
View mutual connections with Ayal
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Ayal
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Activity
9K followers
-
Ayal Yogev reposted thisAyal Yogev reposted thisAI Agents are non-deterministic. You give them a goal, and they go figure out how to reach it. Anjuna Security CSO Mark Bower describes it as "1,000 very enthusiastic interns being given a task and going off to do it." That's a feature and a security nightmare at the same time. The platform built by Ayal Yogev and Yan M. keeps data encrypted even while it's being processed — and their new Agent supervision layer enforces boundaries in real time, at the hardware level. In the piece: how confidential computing works, why agentic AI is forcing enterprises to rethink data protection, and why Bower thinks 2026 is the year it becomes a must. https://lnkd.in/gsRxmKQW
-
Ayal Yogev reposted thisAyal Yogev reposted thisBack in February (seems like an eon ago!), I was fortunate enough to talk to Nizar Jamal, CTO at Payfinia about their use of Confidential Computing as a business enabler for Zero-Trust. Payfinia are a fast growing B2B FinTech offering next-generation FedNow instant payments in the US. For those interested who missed it, the video is below. Big thanks to the Cloud Security Alliance for the excellent FinTech showcase. If you are in payments or financial services like many of our customers handling sensitive data, please don't hesitate to connect to learn more. Confidential Computing is a powerful fit for mitigating insider risk, attack risk, and eliminating third party human risk with a hardware-assisted foundation for zero trust. #payments #confidentialcomputing #fintech #CSA #cloud #3rdpartyrisk #encryption #TEE https://lnkd.in/gMGJE2z7Confidential Computing for Fintechs: Instant Payments Processing | FinCloud Summit 2026Confidential Computing for Fintechs: Instant Payments Processing | FinCloud Summit 2026
-
Ayal Yogev shared thisThe right security solutions have always reduced risk to pave the way for adopting new technologies. Confidential computing is what enables AI for enterprises.Ayal Yogev shared thisConfidential Computing - the critical enabler for AI-first CIO’s in 2026 We agree with InformationWeek: confidential computing is on the CIO agenda because it closes a critical security gap that matters more than ever, especially for modern AI - provable trust, and protected data in use. This matters most for CIOs, CISOs, and leaders responsible for regulated data, sensitive analytics, AI workloads, and trusted agentic collaboration. The next question is not why confidential computing; it is where to use it first for the greatest business and security impact. Read about it: https://lnkd.in/g9xW5bj3Confidential computing resurfaces as security priority for CIOsConfidential computing resurfaces as security priority for CIOs
-
Ayal Yogev reposted thisExcited for Anjuna to showcase real-world use cases for Confidential computing in tomorrows concise and to-the-point session with Punch Tape. Cloud risk has shifted: it is no longer just about keeping data safe at rest and in transit. Modern attacks, insider access, privileged operators, and accelerating privacy and sovereignty expectations mean the runtime is the new battleground. If sensitive data or models can be accessed while workloads are running, your controls are incomplete. In this session we will show, in practical terms, how Confidential Computing helps you: - Secure high-value transaction applications - harden keys, wallets, signing, and critical services against insider and supply-chain risk. - Enable compliant cross-organization collaboration - share datasets or run joint processing while keeping each party’s data isolated and governed. - Protect sensitive AI cloud - run rich data without exposing it to admins, operators, agents, or compromised infrastructure. If you are responsible for cloud security, risk, or regulated innovation, this is worth your time. Link below. #confidentialcomputing #TrustedExecutionEnvironment #TEE #dataprivacy #runtime #cloudAyal Yogev reposted thisCome by our Secure Compute & Trusted Execution event tomorrow, Feb 3rd to better understand the impact of confidential computing from our sponsor Anjuna Security and their CSO Mark Bower!!!! https://lnkd.in/g-Bc_uSa #confidentialcomputing
-
Ayal Yogev shared thisThanks for a great conversation Tim Tonella!Ayal Yogev shared thisThink your data is secure in the cloud? Guess again. Your competitors - and your cloud provider - may still have access to it. I had a chance to sit down recently with Ayal Yogev, CEO and Co-Founder of Anjuna Security to get his thoughts on an emerging shift in cloud security, commonly referred to as Confidential Computing. Most companies encrypt data at rest and in transit, leaving a major vulnerability when the data is actually being PROCESSED. Confidential computing solves that by ensuring no one - not even your cloud provider - can see your code or data while it's running. As a result, confidential computing opens up entirely new forms of collaboration between competitors, governments, and even AI startups. Ayal’s background in Israel Defense Force Unit 8200, as well as senior product leadership roles at companies like OpenDNS, gives him a unique perspective on data security and how large enterprises may not be a safe as they think! We also talked about Ayal's time at Y Combinator and some of those life long take-aways early stage founders can learn from such a great experience. 👉 To see the full pod episode with Ayal, click on the link in my Comment section below. #venturecapital #executiverecruiting #AI #security #startups
-
Ayal Yogev shared thisAmazing to see Gartner recognizing #ConfidentialComputing as one of the top strategic technology trends for 2026!Ayal Yogev shared thisAI & Confidential Computing are on the 2026 Party Invite — and Gartner agrees. Gartner’s Top Strategic Tech Trends for 2026 just dropped — and two things stand out loud and clear: 1. AI security will combat data risks across the agentic ecosystem (agents, MPC, tools, etc...) 2. Confidential computing and TEEs are how we make AI trustworthy. As AI becomes more agentic - building, deciding, even collaborating with other agents dramatically expands the risk surface. Prompt injection, data leakage, tool abuse, credential abuse… the list keeps growing. Traditional “guardrails” aren’t enough anymore. You can’t patch trust after the fact. That’s where Trusted Execution Environments (TEEs) come in. They’re invisible armor that keeps code and data secure while it’s running — even from the underlying infrastructure. In other words, they protect AI in the one place we’ve never been able to protect before: in use. Gartner predicts that by 2029, over 75% of workloads in untrusted environments will be protected this way. That’s huge. It’s also exactly where Anjuna Security has been heading for years - building the foundation for secure, agentic AI with Confidential Computing at its core. We’ve always believed: If AI is going to think for us, it better be trustworthy. And it feels pretty incredible to see the world catching up. If you’re exploring AI agents, LLM infrastructure, or secure data collaboration, this is the NOW moment to bring Confidential Computing into your architecture. Let’s build AI and data systems that are not just powerful, but provably safe. #AI #ConfidentialComputing #AgenticAI #Security #Anjuna #GartnerTrends #TEEs #DigitalTrust #SecureAI 🚀 📈 source: https://lnkd.in/eZhZ6JqzGartner Identifies the Top Strategic Technology Trends for 2026Gartner Identifies the Top Strategic Technology Trends for 2026
-
Ayal Yogev reposted thisAyal Yogev reposted this#Microsoft just moved a $40B mission-critical system to #ConfidentialComputing. This is a tectonic shift. Their Commercial Licensing transaction engine now runs protected even in memory, insulated from cloud admins, OS, and infrastructure threats. In Microsoft’s own words: “Even platform administrators or attackers with elevated access cannot access data while it's in memory.” What is the good news? You can do it too. Without the heavy lift. Anjuna makes Confidential Computing frictionless: ✅ No code changes or rewrites ☁️ Run on Microsoft Azure, AWS, Google Cloud, or on-prem 🔁 Full support for containerized & Kubernetes apps 🧱 Isolation from insiders and tenants 📜 Attestation-backed compliance, out of the box 👉 Read why this move matters to every vendor handling sensitive data from this blog from our Chief Strategy Officer, Mark Bower:Microsoft’s Bold Move to Confidential Computing for Critical Licensing Services – and Why It Matters for Every Vendor Handling Sensitive DataMicrosoft’s Bold Move to Confidential Computing for Critical Licensing Services – and Why It Matters for Every Vendor Handling Sensitive Data
-
Ayal Yogev reposted thisAyal Yogev reposted this#ConfidentialComputing is powerful, but deploying it shouldn’t be painful. SaaS vendors know they need to protect customer data, even from insiders, but implementing #AWSNitroEnclaves is notoriously complex. From application refactoring to EKS integration, the barriers are high. That’s where #AnjunaSeaglass changes the game. It makes AWS Nitro Enclaves deployment seamless. No code changes, no re-architecture, and no specialized knowledge required. ✅ Supports binary-only apps ✅ Integrates easily with #EKS ✅ Simplifies remote attestation ✅ Speeds deployment by 90%+ 📖 Read the blog to learn how Anjuna removes the friction from Nitro Enclaves: 👉 https://lnkd.in/gBx28Kwc
-
Ayal Yogev shared thisAmazing milestone for Anjuna Security. Confidential Computing is becoming tablestakes at financial institutions.Ayal Yogev shared this🚨 Major Milestone: #Anjuna secures another Global Top 10 Bank with #ConfidentialComputing. Confidential Computing is no longer emerging—it’s accelerating. With more than 1 million employees now protected across Anjuna's customers, the #FinancialServices industry is at a clear inflection point. 🌍 These leading banks are using #AnjunaSeaglass and #AnjunaNorthstar to: - Secure AI workloads across borders and clouds - Enable cross-institution collaboration without exposure - Meet privacy, compliance, and resiliency requirements - Unlock insights from sensitive data—safely and at scale 🗣 “Securing another top-tier global bank is further proof that Confidential Computing is becoming the new foundation for secure digital finance.” — Ayal Yogev, CEO of Anjuna We are excited and proud to power a new era of data collaboration—secure, scalable, and AI-ready. 👉 Read the press release: https://lnkd.in/g_aBXGSs
-
Ayal Yogev liked thisAyal Yogev liked thisWhat does “sovereignty” actually mean once you get past the buzzword? With Azure Belgium Central, we can now look at sovereignty through real, deployable technical controls—not abstractions. In this deep dive, we walk through sovereignty in three concrete technical layers: ✅ Data residency & locality — where data lives and how availability is designed ✅ Encryption & key control — including CMK, HSM, and customer ownership ✅ Confidential Computing — protecting data while it’s in use with hardware‑backed TEEs The goal isn’t to oversimplify sovereignty—but to make it architecturally actionable for EU, public sector, and regulated workloads. 👉 Sovereignty in Azure Belgium Central: A Three‑Layer Technical Deep Dive https://lnkd.in/g7hi_Bg7 #Azure #ConfidentialComputing #CloudSecurity #SovereignCloud #AzureInfrastructure Wesley BackelantSovereignty in Azure Belgium Central: A Three-Layer Technical Deep Dive | Microsoft Community HubSovereignty in Azure Belgium Central: A Three-Layer Technical Deep Dive | Microsoft Community Hub
-
Ayal Yogev liked thisToday’s enterprises and the entire software industry are at risk from AI models like Mythos, known for its ability to autonomously discover and exploit software vulnerabilities. To protect enterprise systems from real-time zero-day exploits and compromise, a new approach is required, and it needs to be fast, secure and simple. We believe that a safe and trustworthy future requires new methods and control, starting with a purpose-built, hardware-isolated, intelligent governance layer for provable integrity and incorruptibility of the AI agent. With this approach, you can also prove to your own auditors, your board, and a plaintiff's discovery counsel that autonomous decision authorizations were honored without tamper from other agents, operators, or cloud providers. Leveraging our technology in confidential computing, we are bridging the gap in AI trust. #ConfidentialAI #AITrustAyal Yogev liked thisThe cybersecurity market is being rewritten in real time. Last week in London, I had the opportunity to host a breakfast at our Gartner office and spent two intense days with investors unpacking our latest insights. Three things stood out: → AI complexity is accelerating, and platforms — are now the battleground for market share. → The explosion of AI agents has opened a trust gap that legacy security stacks simply can’t close. → The winners will be those who build for outcomes and secure the agentic economy. The next chapter of cybersecurity will be written by the ones solving for trust at machine speed. Thanks organising and the invite Gaspard du Saillant.
-
Ayal Yogev liked thisIf you are concern with running agentic AI in your cloud or shared environment, here's an approach to secure and authenticate your agent.Ayal Yogev liked thisJoin Mark Bower, CSO of Anjuna Security, and other experts in this session hosted by Punch Tape on May 6 at 9 am PT/noon ET. The webinar, titled Confidential AI Systems, will explore how trust is established, verified, and enforced when autonomous systems access data and take action across clouds and shared infrastructure. Register here: https://lnkd.in/geN2_vGs
-
Ayal Yogev liked thisAyal Yogev liked thisJoin Mark Bower, CSO of Anjuna Security, and other experts in this session hosted by Punch Tape on May 6 at 9 am PT/noon ET. The webinar, titled Confidential AI Systems, will explore how trust is established, verified, and enforced when autonomous systems access data and take action across clouds and shared infrastructure. Register here: https://lnkd.in/geN2_vGs
-
Ayal Yogev liked thisAyal Yogev liked thisAfter 2.5 incredible years, I've recently wrapped up my time at Snowflake, and I thought this would be a good moment to reflect on my experience. From day one, the Engineering Systems team was home. Together we took on an ambitious mission: making it dramatically faster, easier, and more enjoyable for Snowflake's engineers to build and ship quality products to customers. Through programs like Type Faster, Ship Faster, our AI transformation, and a set of foundational tool migrations, we materially moved the needle on developer satisfaction and productivity, and we got there much faster than anticipated. What I'll remember most, though, isn't the metrics. It's the mindset. The shift from individual output to customer outcomes. The relentless focus on solving real developer pain. The team's commitment to consistently closing the loop so our engineers trust they're in good hands. This kind of mindset change takes a village, and it was a privilege to be part of this journey. The list of people who made this journey great is long, which is the best problem to have. So instead of naming folks, I want to say to everyone who made it meaningful for me: THANK YOU. Thank you for challenging me, pushing me, and making me better. Thank you for helping put Snowflake at the forefront of engineering productivity in the age of AI. I feel lucky to have had this experience and to have shared it with my Snowflake people. Leaving grateful, energized, and excited for what's next. #dev_productivity #leadership #snowflake
-
Ayal Yogev liked thisAyal Yogev liked thisThe recent high profile breach that everyone is talking about made the news because it involves an AI agent. The breach was arguably caused by misplaced trust: the AI agent was trusted because a human erroneously trusted it. This attack targets the agents instead of the humans and operates inside human-level trust grants. Traditional identity-based access control was designed for a world where humans make decisions. With AI agents, software makes the decisions autonomously, at scale, and continuously. The authentication layer we need is no longer 'who are you' but 'what level of trust is associated with the agentic code, and can you prove it.' We are now operating in a world where a compromised AI agent becomes the next big security vulnerability. A new approach in security defense is required: the attestation of the AI agent’s level of trust. Read Ayal Yogev's post on how we tackle this problem: https://lnkd.in/g4KQpXzV #ConfidentialAI
-
Ayal Yogev reacted on thisAyal Yogev reacted on thisThis weekend we lost Amir, and we are still trying to find the words. Many of you know Amir as the co-founder and CEO of DualBird. At ICON, he was something more - someone who quietly helped shape it into what it is, on a daily basis. Before he even finished his ICON batch (Batch 13 forever), his group appointed him “the mayor”. Since then it became a tradition - at every batch kickoff, Amir was there, telling them they needed to pick their own mayor too. He gave his time to the founders who needed it most. He screened teams. He judged finalist days. He mentored. He showed up, again and again, because that was who he was. No matter how busy he got, he always found time for us. His presence was felt across the community, and will be internally missed. Anyone who spent ten minutes with Amir knows he was different. You’d come to him stuck on something, and leave lighter, with a clearer head, and your battery somehow recharged. He told you what you needed to hear, not what you wanted to hear. He was a big guy, with a smile that reached his eyes. He loved a good whiskey. He loved karaoke. He was fully himself, wherever he was. It was hard to be around Amir and not want to be a little more like him. A mensch, in the truest sense of the word. To Noa, Amir’s family, friends, the DualBird team, and to everyone who loved him - our hearts are with you. Amir, we will miss you forever. We will keep working hard to make you proud. Yasmin Lukatz | Noa Topaz | Jessica Hare | Yaniv Benji | Shani Yavin | Dafna Kalisky Horn | Netta Kaduri Gior | Victoria Bakish | Nathan Doron | Gilad Tal | Ohad Gamliel | Ehud Eliaz | Gil Dibner | Angular Ventures | Andy McLoughlin | Uncork Capital | David Gussarsky | Lightspeed
-
Ayal Yogev liked thisAyal Yogev liked thisAI Agents are non-deterministic. You give them a goal, and they go figure out how to reach it. Anjuna Security CSO Mark Bower describes it as "1,000 very enthusiastic interns being given a task and going off to do it." That's a feature and a security nightmare at the same time. The platform built by Ayal Yogev and Yan M. keeps data encrypted even while it's being processed — and their new Agent supervision layer enforces boundaries in real time, at the hardware level. In the piece: how confidential computing works, why agentic AI is forcing enterprises to rethink data protection, and why Bower thinks 2026 is the year it becomes a must. https://lnkd.in/gsRxmKQW
Education
Recommendations received
4 people have recommended Ayal
Join now to viewView Ayal’s full profile
-
See who you know in common
-
Get introduced
-
Contact Ayal directly
Other similar profiles
Explore more posts
-
Rishaad Currimjee
Golden Sparrow • 8K followers
We're excited to introduce our latest investment, Oryo.io - the security layer for agentic AI. Prashanth R. and Swaroop S., veterans of Okta and Wiz, are building agentic visibility and a trust layer on the MCP protocol for enterprise autonomous agents. Like Waymo’s cars today, agentic AI across enterprises will soon ingest data, make decisions, and take action. As adoption rises, the problem shifts from capability to control. CISOs manage identity and access for humans today. Okta anchors that trust layer for non-humans tomorrow. After our Agentic AI conference in Feb 2025 led by Anand Rao, we came with prepared minds to our first call with Oryo. Michael Marmor led diligence and is working closely with the founders as they build their MVP. We wrote the first check into Oryo. Village Global (Reid Hoffman) and Seven Hill Ventures (Michael Coates) followed soon after. Perhaps Nikesh Arora should take notice :) Venkat Raju, JB Michel, Rahul Harikumar, Quentin Staes-Polet Josh Cunningham
117
9 Comments -
Rami Elkhatib
Acero Capital • 3K followers
Real time detection of cyber attacks on the application layer has historically been a major blind spot. Using runtime telemetry, the Contrast Security Graph enables SecOps to detect and stop breaches as they happen. From detection to deployable fix in mere minutes via Contrast's context-aware AI. #ADR #AICodeSecurity #RuntimeSecurity #AppSec
16
2 Comments -
Eilon Elhadad
Echo • 9K followers
$50M in 10 months - here’s how I think Echo got here: #1 We stayed in our lane. After Argon, we didn’t chase a new market for our second start up. We targeted a problem in the world of container vulnerabilities that we’d seen firsthand with every Fortune 500 company we worked with. #2 We prioritized partners from day one. We understood that ease of use is essential for cloud security solutions, so we started with our partners. We made sure that echo integrates with all of the major container scanners and registries so our customers wouldn’t have to change the way they work today. #3 We hired experts in our space. We brought in engineering, product, and sales leaders who didn’t require training wheels in container security. They built the scanners and tools we now integrate with, bringing tons of expertise with them. #4 We made a deliberate choice to stand out. While deep cloud security experience mattered for building the product, we intentionally brought in marketing and design talent from outside the industry so we wouldn’t sound like everyone else. This Series A round is an exciting milestone, but it’s just the beginning. Big big things are coming, so stay tuned. N47 Notable Capital Hyperwise Ventures SentinelOne SVCI - Silicon Valley CISO Investments Eylam Milner
565
173 Comments -
Christopher Clark
Soulbound Security • 6K followers
OpenAI & Paradigm just dropped EVMBench — and every security professional needs to pay attention. EVMBench is a new open-source benchmark evaluating AI agents' ability to detect, patch, and exploit smart contract vulnerabilities — built from 120 curated vulns across 40 real-world audits, including scenarios from Stripe's Tempo L1. This is going to accelerate blockchain security in a meaningful way. Having a standardized, reproducible framework for measuring AI capability against on-chain code is something the ecosystem has desperately needed. The data alone is already revealing: GPT-5.3-Codex scores 72.2% in exploit mode — up from 31.9% just six months ago with GPT-5. That rate of improvement is staggering. But here's what my traditional cybersecurity colleagues need to understand — because your mental model is wrong for this domain: Blockchain is not your patch-Tuesday world. In enterprise security, the lifecycle is detect → patch → deploy. You find a vuln, you push a fix, you move on. That model breaks completely with smart contracts. Most deployed contracts are immutable. Once on-chain, the code cannot be changed. No patch. No hotfix. No emergency update. The real-world attack sequence for blockchain will be: Detect → Exploit → Profit — long before any remediation is possible, if remediation is even an option. EVMBench's own results confirm the asymmetry: AI is already significantly better at exploiting contracts than detecting or patching the vulnerabilities that enable it. For legacy DeFi infrastructure securing $100B+ in assets, this has massive implications: → Contracts deployed years ago with no upgrade path now face AI-powered adversaries that didn't exist when that code was written → The cost of exploit discovery just dropped by orders of magnitude → Pre-deployment auditing alone is no longer sufficient — it needs to be continuous, adversarial, and AI-augmented → Protocols without proxy patterns, timelocks, or circuit breakers need to reassess their risk posture immediately The value EVMBench brings is giving the ecosystem a common language and measurement framework to quantify this threat and build defenses against it. This is exactly the kind of tooling that bridges the gap between AI capability research and real-world blockchain security operations. https://lnkd.in/eh29DRHy
15
-
Francisco Velazquez
Holtium • 1K followers
Many companies cut the first security check long before they build the first security strategy, and the gap isn’t cheap. Our new Holtium insight shows how to spot that lag early and quantifies what it costs. Worth a 3-minute read if you’re on a growth path. 👇
17
-
Daniel Young
Circadian Risk Inc. • 9K followers
Here’s a pattern I’m seeing more often: More sites. More assessments. More reporting expectations. Same headcount. Security teams are being asked to scale output without scaling structure. So what happens? Assessments become episodic. Reporting takes too long. Prioritization becomes subjective. And leaders spend more time translating risk than reducing it. This isn’t a capability issue. It’s an architecture issue. At some point, physical security has to operate with the same operational discipline as finance and IT. Otherwise it stays in permanent catch-up mode. For security people overseeing medium to large portfolios (20+ sites): What’s currently your biggest bottleneck volume, visibility, or validation? And why do you think this is?
5
1 Comment -
Nate Nead
HOLD.co • 28K followers
📖 https://lnkd.in/g5YDnuCw Is ASLR giving us a false sense of security? Side channel attacks — like timing analysis, cache probing, and page fault observations — are quietly undermining memory randomization. Once ASLR is bypassed, even basic memory exploits become deadly again. The takeaway? Side channels aren’t just theoretical—they’re subtle, powerful, and growing. With each hardware or OS innovation, new side channel paths emerge. 💡 We need layered defenses: dynamic ASLR, low-resolution timers, stricter sandboxing, and better detection of recon patterns. Are side channels the next major frontier in memory exploitation? What should modern threat models include that they often don’t? #Cybersecurity #InfoSec #ASLR #SideChannel #MemorySecurity #ThreatModeling
3
-
Ephraim Alexander Ebstein
FIT Solutions, LLC • 5K followers
Cyberattacks are getting smarter. Are your defenses keeping up? AI can help you: * Spot threats in real time * Predict risks before they spread * Cut through alert noise * Respond faster * Meet compliance needs But tools alone aren’t enough. You need the right strategy. See how AI + expert guidance can improve your cybersecurity. Read the full post: https://hubs.la/Q03szv3J0 #Cybersecurity #AI #ArtificialIntelligence #Compliance
20
-
John Cowgill
Costanoa Ventures • 7K followers
You don’t always get a second shot with founders like Ed Bellis and Michael Roytman. When you do, you say yes fast. They helped define the last era of vulnerability management with Kenna Security. Now they’re teaming up with Jay Jacobs — the creator of Exploit Prediction Scoring System (EPSS) — to build something even more ambitious: Empirical Security. Empirical is building custom AI models for every enterprise — local, tailored, predictive — so security teams can act with confidence, not just alerts. Most startups are using AI to chase alerts in the SOC. Empirical is upstream of that, helping teams prevent incidents by deeply understanding what matters in their environment. It’s a big swing — but we think it’s the most original idea in cybersecurity right now. One model per customer. A real security brain. And they’ve quietly assembled the best exploitation dataset in the world to power it. We couldn't be more excited to back this elite team again.
174
14 Comments
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content