Why traditional pentesting approach

traditional pentest

Why traditional pentesting approach doesn’t keep pace with the times?