We got you covered.

EP Gadgets / tech

Protection Providers & Social Media Policy: The Emerging Necessity

Social media has become so much a part of everyone's daily activities, and many use it as a way to promote their services, speak their mind and interact with others. Thus, companies who either have or utilize a social...

Corporate Surveillance: Tracking Your Every Step

In certain situations, corporate surveillance can lead to an invasion of one’s privacy. For years, large players like Google and Facebook have continued to amass the personal data of billions of internet users. Companies want to know everything about us,...

Rise of Covert Surveillance Cameras in the Home and Office

Surveillance cameras need to be inconspicuous to be done right. And to do it well requires the use of covert security systems that monitor the subject while they are unaware it is or could be taking place.      Furthermore, the...

What Is Red Teaming and What Are the Benefits?

First, we'll cover the basics and unpack an otherwise loaded question — what is red teaming? The term red team refers to an organized group of authorized persons who simulate a potential cyber-attack to exploit any capabilities that exist and could...

What Are the Types of Attacks in Cybersecurity?

Cybersecurity is not just about safeguarding your company’s entire network. Ignoring the establishment of comprehensive digital security systems leaves your business exposed to devastating operational repercussions in the future. There are different types of attacks in cybersecurity that include,...

The Biggest Collection of Passwords Leaked: RockYou2021

Brace yourselves, as the cybersecurity attacks this year are just becoming bigger and more dangerous. In the latest attack, we saw the biggest collection of passwords leaked, with the number reaching as high as 8.4 billion password entries. A user...

Digital Profiling for Close Protection Officers

One of our most frequent client requests is to conduct a digital profiling service against both executives and their families. This uncovers exactly what information someone can find about them online. Even the most privacy-conscious individuals can be surprised at...

A Buying Guide For the Best Covert Surveillance Cameras

Are you on the market for the best covert surveillance cameras but the buying guides are all pointing to wildly different things? Are you confused, and about ready to give up the shop altogether? If you’ve answered yes to...

What Is a Cybersecurity Event and How to Respond to It?

Cybersecurity events and incidents are happening all over the world, all the time. It’s just that the big ones aren’t making headlines, but are being dealt with by a group of highly trained security experts. But what exactly are...

New Data Breach: 500 million LinkedIn Profiles Leaked

Just a few days after a massive Facebook data leak made the headlines around the globe, it seems like we’re in for another one, this time involving LinkedIn. A massive archive with data purportedly scraped from 500 million LinkedIn...

Latest News

Executive Protection Organizations Worldwide — IPSB

For the fourth issue in our Executive Protection Organizations Worldwide series, we talked with Chuck Tobin, a Member Board...

Download Advance Work: Route Survey

    Download Advance Work: Restaurant

      Download Helicopter Extration: Landing Zone

        EP Career

        Your registry of the best opportunities in executive protection.

        EP Directory
        The right place to explore EP companies.