Organizations are moving more infrastructure, data, and apps to the cloud – supporting remote work and engaging with third-party ecosystems. This broader, more dynamic environment results in an expanded set of attack surfaces. Threat actors are taking advantage of this complexity, exploiting gaps and relentlessly stepping up the volume of attacks. Paired with the growth of the cybercrime-as-a-service ecosystem, the threat landscape has become broader and more complex.