We got you covered.

Logistics

Does Your Protective Intelligence Program Come Full Circle?

Often, we may believe that having a protective intelligence program is the key to preventing unthinkable acts of violence. But, actually, it's just the engine that refines all the raw data that goes into your intelligence program. So, hopefully,...

What Is Red Teaming and What Are the Benefits?

First, we'll cover the basics and unpack an otherwise loaded question — what is red teaming? The term red team refers to an organized group of authorized persons who simulate a potential cyber-attack to exploit any capabilities that exist and could...

What Are the Types of Attacks in Cybersecurity?

Cybersecurity is not just about safeguarding your company’s entire network. Ignoring the establishment of comprehensive digital security systems leaves your business exposed to devastating operational repercussions in the future. There are different types of attacks in cybersecurity that include,...

Circles of Security: Misconceptions and Applications

Industry specialists sometimes think of them as a surefire way of protecting the principal. And yes, many justifiably revere circles of security as one of the best protection systems in EP. We at EP Wired couldn't agree more. As a matter...

High-Risk Environments with Robert Currie

We sat down with Robert Currie – owner and founder of RC Advisory Services and security consultant to many companies – to discuss high-risk environments, covert operations, armored transport, and more. You have traveled the world, delivering services in countries...

Leadership in Event Security: Managing Teams Effectively and Productively 

When it comes to leadership in event security, it is the most important factor for the successful outcome of any event. Whether a small, private event with just a handful of guards or a massive music festival or sporting...

Anti-Surveillance Tactics to Use in Daily Operations

In broad terms, anti-surveillance tactics comprise a series of actions to identify sources of unwanted attention from the media, stalkers, followers, fixated persons, groups, or forms of hostile reconnaissance. For example, if someone attempts to cause physical or reputational harm...

Greed in Executive Protection: EP Series on Ethics

Over the next few weeks, I'll touch on some fundamental ethical considerations for creating and maintaining your reputation as a competent and honorable protector. But, for now, let's talk about: Greed in Executive Protection. In the movie Wall Street, Michael...

President Zuma in Jail: 75 Killed in South Africa Riots

Former president Jacob Zuma was arrested last Friday, with 75 people killed in the ensuing South Africa riots. Those well-acquainted with the country's history claim that this was its worst unrest since the end of apartheid. Riots derailed the country...

A Brief History of International Terrorism 

Knowing the proper history of international terrorism, as well as the motives behind it, is key. Having that kind of intel can help governments and security professionals come up with more efficient defensive strategies. With that said, it’s time to...

Latest News

The Pararescuemen: A Lifeline in Executive Protection

The sun was setting on the Mediterranean, casting a golden glow over the harbor as a superyacht floated serenely...

Download Advance Work: Route Survey

    Download Advance Work: Restaurant

      Download Helicopter Extration: Landing Zone

        EP Career

        Your registry of the best opportunities in executive protection.

        EP Directory
        The right place to explore EP companies.