shielding data in use is critical as it's vulnerable to data breaches and 3rd-bash access. Also, if hackers intercept and compromise the data, they might access equally data at rest and data in transit.
In the https://wearethelist.com/story19911183/5-simple-statements-about-anti-ransom-software-explained