We got you covered.

Access control

Are You a Soft Target? Here’s How to Find Out 

Whether at home, work, or play, it's easy for a busy executive to remain blind to all manner of risks and threats. Yet, just because you don't see a threat doesn't mean it's not there. Security professionals refer to...

Joe Rogan Hired Armed Bodyguards to Protect His Family

One of the most popular podcasters to have ever lived, Joe Rogan hired armed bodyguards to protect himself, his family, and million-dollar property due to recent backlash against his controversial Spotify-based show. Retired Navy Seals turned elite security are now...

Access Control in Executive Protection

Access control is the cornerstone of all security operations and security-related sectors. It comprises non-sterile (public area) and sterile (post-screening) areas. Simply put, suppose someone does not belong in an area or past a certain point. In that case,...

Rise of Covert Surveillance Cameras in the Home and Office

Surveillance cameras need to be inconspicuous to be done right. And to do it well requires the use of covert security systems that monitor the subject while they are unaware it is or could be taking place.      Furthermore, the...

What Is Red Teaming and What Are the Benefits?

First, we'll cover the basics and unpack an otherwise loaded question — what is red teaming? The term red team refers to an organized group of authorized persons who simulate a potential cyber-attack to exploit any capabilities that exist and could...

What Are the Types of Attacks in Cybersecurity?

Cybersecurity is not just about safeguarding your company’s entire network. Ignoring the establishment of comprehensive digital security systems leaves your business exposed to devastating operational repercussions in the future. There are different types of attacks in cybersecurity that include,...

Leadership in Event Security: Managing Teams Effectively and Productively 

When it comes to leadership in event security, it is the most important factor for the successful outcome of any event. Whether a small, private event with just a handful of guards or a massive music festival or sporting...

Anti-Surveillance Tactics to Use in Daily Operations

In broad terms, anti-surveillance tactics comprise a series of actions to identify sources of unwanted attention from the media, stalkers, followers, fixated persons, groups, or forms of hostile reconnaissance. For example, if someone attempts to cause physical or reputational harm...

Armed Robbers Broke Into Eran Zahavi’s Home in Amsterdam

The wave of assaults and robberies of footballers and their families in Europe continues. The most recent victims is the family of PSV Eindhoven’s striker. On Sunday, armed robbers broke into Eran Zahavi's home in Amsterdam and robbed his...

The Residential Security Plan (RSP): In House or Contract Out?

The age-old question in security is, do we conduct business with in-house assets or contract out? The debate is endless, and each option has its pros and cons. There are thousands of companies that provide residential security for private...

Latest News

Allied Universal Acquires Three Security Firms

Leading security and facility services company Allied Universal continues its global expansion in North America and the international market....

Download Advance Work: Route Survey




    Download Advance Work: Restaurant




      Download Helicopter Extration: Landing Zone




        EP Career

        Your registry of the best opportunities in executive protection.

        EP Directory
        The right place to explore EP companies.