{"version":"1.0","provider_name":"Eptura","provider_url":"https:\/\/eptura.com","title":"7 big questions answered on 3rd party penetration testing","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"UEw1PZTPUT\"><a href=\"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/\">7 big questions answered on 3rd party penetration testing<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/embed\/#?secret=UEw1PZTPUT\" width=\"600\" height=\"338\" title=\"&#8220;7 big questions answered on 3rd party penetration testing&#8221; &#8212; Eptura\" data-secret=\"UEw1PZTPUT\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/eptura.com\/wp-content\/uploads\/2025\/01\/facilities_mgmt_3-1-1024x512-1.webp","thumbnail_width":1024,"thumbnail_height":512,"description":"And while a pen test involves the use of automated tools and process frameworks, the focus is actually on the team of testers, the experience they bring to the test, and how they leverage their skills and resources when simulating the attacks."}