We got you covered.

EP Gadgets / tech

Cut-Resistant Fabrics: Protecting Arteries, Nerves, Muscles, and Ligaments

It was on 13 March 2011 when my friend Craig Wylde was brutally assaulted. Having previously served as an Infantry soldier in the British Army, Craig ultimately became a prison officer at the Category A (high security) Frankland Prison,...

The Stalker – Much More Than a Physical Threat

The development of the internet in the 21st century has added another, deep layer of complexity to personal protection. Reports of online stalking and harassment are becoming more common. But how serious is the threat a stalker poses? How...

The Most Secure Messaging Apps in 2022

We have all been left speechless lately, when Facebook, Whatsapp, and Instagram weren't accessible for hours on one October day of 2021. The panic-inducing downtime has once again proven how much people and businesses depend on these apps for...

CCTV in EP: The Core Benefits

The public views executive protection in the forefront as bodyguards in black suits, earpieces, and sunglasses carefully escorting a VIP from point A to point B. Of course, along with mostly everything on the surface, there is much more...

Britney Spears Watched by Security: Life Under Surveillance

A growing number of investigative reports surrounding the controversial issue of Britney Spears watched by security are surfacing left, right, and center. With the release of both Framing Britney Spears and Controlling Britney Spears, the two New York Times-produced documentaries, some concerning...

Protection Providers & Social Media Policy: The Emerging Necessity

Social media has become so much a part of everyone's daily activities, and many use it as a way to promote their services, speak their mind and interact with others. Thus, companies who either have or utilize a social...

Corporate Surveillance: Tracking Your Every Step

In certain situations, corporate surveillance can lead to an invasion of one’s privacy. For years, large players like Google and Facebook have continued to amass the personal data of billions of internet users. Companies want to know everything about us,...

Rise of Covert Surveillance Cameras in the Home and Office

Surveillance cameras need to be inconspicuous to be done right. And to do it well requires the use of covert security systems that monitor the subject while they are unaware it is or could be taking place.      Furthermore, the...

What Is Red Teaming and What Are the Benefits?

First, we'll cover the basics and unpack an otherwise loaded question — what is red teaming? The term red team refers to an organized group of authorized persons who simulate a potential cyber-attack to exploit any capabilities that exist and could...

What Are the Types of Attacks in Cybersecurity?

Cybersecurity is not just about safeguarding your company’s entire network. Ignoring the establishment of comprehensive digital security systems leaves your business exposed to devastating operational repercussions in the future. There are different types of attacks in cybersecurity that include,...

Latest News

Operational Fitness in Executive Protection

Recently I wrote a piece for EP Wired about the importance of combatives training for the protection professional and...

Download Advance Work: Route Survey




    Download Advance Work: Restaurant




      Download Helicopter Extration: Landing Zone




        EP Career

        Your registry of the best opportunities in executive protection.

        EP Directory
        The right place to explore EP companies.