Richard continues his discussion with Olly Stimpson from CyberArk around the protection measures available for credential stuffing.