<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/">
	<channel>
		<title>Author at Infinum</title>
		<atom:link href="https://infinum.com/blog/author/sean-mccarthy/feed/" rel="self" type="application/rss+xml" />
		<link></link>
		<description>Building digital products</description>
		<lastBuildDate>Fri, 24 Apr 2026 09:08:05 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>

					<item>
				<image>
					<url>19277675https://infinum.com/uploads/2026/04/pen-vs-red.webp</url>
				</image>
				<title>Pen Testing, Red Teaming, and Why No Scanner Can Replace Either</title>
				<link>https://infinum.com/blog/pen-testing-red-teaming/</link>
				<pubDate>Wed, 01 Apr 2026 14:02:28 +0000</pubDate>
				<dc:creator>Sean McCarthy</dc:creator>
				<guid isPermaLink="false">https://infinum.com/?p=19277675</guid>
				<description>
					<![CDATA[<p>Pen testing and red teaming are often used interchangeably. They're not. Here's what each actually does, when you need which, and why automated scanners can't replace either.</p>
<p>The post <a href="https://infinum.com/blog/pen-testing-red-teaming/">Pen Testing, Red Teaming, and Why No Scanner Can Replace Either</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</description>
				<content:encoded>
					<![CDATA[

<div
	class="wrapper"
	data-id="es-217"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-92">
	</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-95"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-93">
	<p	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-94'
	>
	<strong>Pen testing and red teaming are often used interchangeably. Both probe your defences. Both find what&#8217;s broken. But they ask fundamentally different questions, and the one you choose shapes how wide you assess your business security.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-98"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-96">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-97'
	>
	<a href="https://infinum.com/cybersecurity/penetration-testing/" id="https://infinum.com/cybersecurity/penetration-testing/" target="_blank" rel="noreferrer noopener">Penetration testing</a> and <a href="https://infinum.com/cybersecurity/red-teaming/" target="_blank" rel="noreferrer noopener">red teaming</a> both start from the same premise: hire someone to break in before the bad guys do. But they&#8217;re different tools for different problems, and conflating them is one of the more common mistakes organisations make.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-101"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-99">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-100'
	>
	Two approaches, similar goal</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-104"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-102">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-103'
	>
	Penetration testing is focused. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-107"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-105">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-106'
	>
	You define the scope – a specific application, a network segment, a set of systems – and testers use the <a href="https://infinum.com/blog/penetration-testing-steps/" target="_blank" rel="noreferrer noopener">penetration testing methodology step by step</a> in an attempt to find and exploit vulnerabilities within it. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-110"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-108">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-109'
	>
	Most engagements use a gray box approach: testers are given enough context to work efficiently. Credentials, access, scope. Enough to find what matters within a fixed timeframe.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-112"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-111'
	>
	<strong>Red teaming is the opposite of narrow. It&#8217;s intelligence-led and scenario-driven, built to simulate a sophisticated adversary targeting your organisation specifically. </strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-115"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-113">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-114'
	>
	The approach changes depending on who you are – <a href="https://infinum.com/red-team-services/" id="https://infinum.com/red-team-services/">a red team</a> targeting a bank crafts different phishing emails, chooses different attack vectors, and pursues different objectives than one targeting a logistics company. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-118"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-116">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-117'
	>
	The whole exercise is shaped by what real threat actors are actually doing to organisations like yours.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-121"
	 data-animation-target='inner-items'>
		
			<div class="block-group" data-id=es-120>
	
<div
	class="wrapper"
	data-id="es-119"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			
<figure class="wp-block-table is-style-first-column-strong"><table class="has-fixed-layout"><thead><tr><th>Pen testing</th><th><strong>Red teaming</strong></th></tr></thead><tbody><tr><td>Narrow, system-focused scope</td><td><strong>Whole-organisation scope</strong></td></tr><tr><td>Often gray box by default</td><td><strong>Intelligence-led, scenario-based</strong></td></tr><tr><td>Time-boxed engagement</td><td><strong>Simulates a real, tailored adversary</strong></td></tr><tr><td>Finds specific technical vulnerabilities</td><td><strong>Tests people, process, technology</strong></td></tr></tbody></table></figure>
		</div>
	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-124"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-122">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-123'
	>
	Penetration Testing vs Red Teaming: Key Differences</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-127"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-125">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-126'
	>
	The simplest way to tell them apart: pen testing answers &#8220;is this system secure?&#8221;, red teaming answers &#8220;could a determined attacker get into our organisation?&#8221;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-130"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-128">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-129'
	>
	Scope is the biggest practical difference. Pen testing is bounded — a specific application, network segment, or set of APIs. The tester works within those limits, finds what&#8217;s exploitable, and reports it. Red teaming has no such boundary. The adversary simulation can move across applications, people, and physical premises, using whatever combination of vectors a real attacker would.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-133"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-131">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-132'
	>
	The objectives differ, too. Pen testing produces a list of technical vulnerabilities with severity ratings and remediation steps. Red teaming produces something more like a case study: here is how an attacker targeting your organisation could move from initial access to their end goal, and here is what your people, processes, and technology did, or didn&#8217;t do to stop them.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-136"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-134">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-135'
	>
	Cost and time reflect this. A pen test might run for a week or two. A red team engagement is typically measured in weeks to months, and requires significantly more planning on both sides.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-139"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-137">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-138'
	>
	When Do You Need Pen Testing vs Red Teaming?</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-142"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-140">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-141'
	>
	Pen testing is right for checking specific systems — after a new build, before a release, or as part of a compliance cycle. TIBER-EU and<a href="https://infinum.com/blog/eu-cybersecurity-legislation-nis2-dora/" id="https://infinum.com/blog/eu-cybersecurity-legislation-nis2-dora/"> DORA</a> both require it. If you&#8217;re running one annually and after major changes, you&#8217;re doing the basics right.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-145"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-143">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-144'
	>
	Red teaming is for organisations that have already done the basics. You need mature security processes in place first — incident detection, response playbooks, trained staff — otherwise a red team engagement mostly finds that your foundations are weak, which a pen test would have told you for a fraction of the cost. When that foundation is there, red teaming stress-tests the whole picture: not just whether systems are patched, but whether your people, processes, and assumptions hold up under a realistic attack.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-148"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-146">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-147'
	>
	The other factor is the threat model. If you handle sensitive data, operate critical infrastructure, or are the kind of target sophisticated threat actors actively pursue, red teaming answers a question pen testing can&#8217;t: not &#8220;is this system secure?&#8221; but &#8220;could a determined adversary get into our organisation?&#8221;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-151"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-149">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-150'
	>
	If you&#8217;re not sure which fits, start with a pen test. And if you want to understand what a red team engagement actually involves, <a href="https://infinum.com/red-team-services/" id="https://infinum.com/red-team-services/">explore our red team services</a>.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-154"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-152">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-153'
	>
	Technical depth isn&#8217;t enough</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-157"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-155">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-156'
	>
	The best pen testers and red teamers share two things: deep technical expertise and genuine creativity. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-160"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-158">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-159'
	>
	The technical side is obvious – you need to understand how systems behave under pressure, and how to adapt when a vector doesn&#8217;t work as expected. But creativity is what separates good from exceptional.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-163"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-161">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-162'
	>
	Testing isn&#8217;t a checklist. When a system reacts unexpectedly, the question isn&#8217;t &#8220;what does the tool say next?&#8221; – it&#8217;s &#8220;what does this tell me, and where does it lead?&#8221; That kind of thinking can&#8217;t be scripted. It has to be developed.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-167"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="blockquote block-blockquote__blockquote" data-id="es-164">
	
	<div class="blockquote__content">
		<i
	class="icon blockquote__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='blockquote-24' data-id='es-165'>
	<svg fill='none' height='24' viewBox='0 0 24 24' width='24' xmlns='http://www.w3.org/2000/svg'><path clip-rule='evenodd' d='m12 24c6.6274 0 12-5.3726 12-12 0-2.79685-.9568-5.37021-2.561-7.41062-.581.22951-1.0832.60583-1.5069 1.12898-.5132.60844-.7698 1.41969-.7698 2.43375v.07605h2.5789v5.59004h-5.6197v-5.01962c0-1.11547.154-2.06616.4619-2.85205.3336-.81125.757-1.48307 1.2702-2.01545.528-.52161 1.1175-.92155 1.7687-1.1998-2.0728-1.70651-4.7279-2.73128-7.6223-2.73128-6.62742 0-12 5.37258-12 12 0 6.6274 5.37258 12 12 12zm-3.53811-18.05347c-.30793.78589-.46189 1.73658-.46189 2.85205v5.01962h5.6197v-5.59004h-2.5789v-.07605c0-1.01406.2566-1.82531.7698-2.43375.5389-.63379 1.1804-1.05209 1.9245-1.2549v-2.28164c-.7441.07605-1.4626.25351-2.1555.53238-.6928.27887-1.3086.68449-1.84752 1.21688-.51321.53238-.9366 1.2042-1.27019 2.01545z' fill='currentColor' fill-rule='evenodd'/></svg></i><p	class='typography typography--size-36-text js-typography blockquote__quote'
	data-id='es-166'
	>
	<strong>You need to think like an attacker – then explain the risk in language a board member can act on.</strong></p>
		<div class="blockquote__caption-wrap">
					</div>
	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-170"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-168">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-169'
	>
	The second half of that matters as much as the first. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-173"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-171">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-172'
	>
	A brilliant technical finding is worthless if it can&#8217;t be translated into plain language. The job isn&#8217;t just to find vulnerabilities – it&#8217;s to help the organisation understand what they mean and what to do about them.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-176"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-174">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-175'
	>
	Why no scanner replaces this</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-179"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-177">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-178'
	>
	<a href="https://infinum.com/blog/security-gaps-in-vibe-coded-applications/" target="_blank">Our research into AI-generated code security</a> found that automated tools are good at cataloging CVEs, misconfigured headers, and outdated libraries. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-182"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-180">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-181'
	>
	They&#8217;re fast, they&#8217;re consistent, and they&#8217;re useful. But they operate on fixed logic. They flag what they&#8217;re programmed to flag, and they stop there.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-185"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-183">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-184'
	>
	A skilled tester doesn&#8217;t stop there. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-188"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-186">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-187'
	>
	They notice how a system reacts, chain together findings that no single tool would connect, and pursue lines of attack that require judgment – not just pattern matching. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-190"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-189'
	>
	<strong>Automated scanners also can&#8217;t walk through your front door pretending to be IT support, or craft a phishing email convincing enough to fool a trained employee.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-193"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-191">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-192'
	>
	Nine times out of ten, <a href="https://infinum.com/blog/how-do-phishing-simulations-contribute-to-enterprise-security/">real attackers get in through people, not ports</a>. A scanner has nothing to say about that. Manual testing does.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-196"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-194">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-195'
	>
	This is why organisations that rely on automated tools as their primary security layer end up with a false sense of coverage. The scanner ran clean – but that&#8217;s only true for the things the scanner knows how to look for. The cost of finding out too late is well-documented in our breakdown of <a href="https://infinum.com/blog/cyberattack-cost/">the real cost of a cyberattack</a>, which shows what&#8217;s actually at stake.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-199"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-197">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-198'
	>
	Attackers aren&#8217;t limited by that constraint. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-202"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-200">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-201'
	>
	A vendor with a quiet network connection into your environment, a help desk employee who clicks the wrong attachment – these don&#8217;t show up on a dashboard. They show up when it&#8217;s too late.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-209"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<a	class="card-simple js-card-simple card-simple--is-ad block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-203"
	 href='https://infinum.com/cybersecurity/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<p	class='typography typography--size-36-text js-typography card-simple__heading'
	data-id='es-204'
	>
	<strong>Want to discover security vulnerabilities before attackers do? </strong></p>		</div>

		<p	class='typography typography--size-16-text-roman js-typography card-simple__paragraph'
	data-id='es-205'
	 id='es-203-paragraph'>
	Explore the full list of our cybersecurity services. </p><button	class="btn btn--color-infinum btn--size-small btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-206"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-207'
	>
	<strong><strong>Learn more</strong></strong></div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-208'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-212"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-210">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-211'
	>
	So, the question isn&#8217;t whether to test. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-215"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-213">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-214'
	>
	It&#8217;s whether you&#8217;re testing the right things, in the right way, with people who can tell the difference. Automated tools have their place – but they&#8217;re a floor, not a ceiling.</p></div>	</div>
</div>
</div>		</div>
	</div><p>The post <a href="https://infinum.com/blog/pen-testing-red-teaming/">Pen Testing, Red Teaming, and Why No Scanner Can Replace Either</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</content:encoded>
			</item>
		
	</channel>
</rss>