The usage of SaaS applications has increased dramatically over the last few years. For example, many customers have adopted productivity solutions such as Microsoft 365, Google Workspace or Zoom - taking advantage of the abilities of these SaaS offerings.
On the flip-side - this also means that sensitive data has been moved to these environments, which attracts malicious actors on one hand and extends compliance efforts on the other.