People are always talking about the benefits of kettlebell training for MMA athletes, but not too many people are capable of explaining why this is so. So, I took it upon myself to research and develop …
People are always talking about the benefits of kettlebell training for MMA athletes, but not too many people are capable of explaining why this is so. So, I took it upon myself to research and develop …
The Steel Bell Shouldering Squat involves a rapid, fluid movement that engages the entire body with each rep. Starting with the Steel Bell on the ground, rapidly lift it towards your shoulder while simultaneously dropping …
Summary The Battle Ring Chest Fly is a powerful chest and shoulder exercise that will also give you outstanding core strength if performed regularly. In addition to push ups and dips on the battle rings, the chest fly is …
Since opening Asylum Fitness in early 2011, I have had multiple inquiries regarding the unique space and setup. Whether it be phone calls, Facebook messages, or emails I am always happy to talk about the …
Workout Summary If you want to mix up your next strength workout, look no further than this heavy double kettlebell workout. 5×5 training is a standard strength workout that has been around for many years …
It was a few years back when Mark de Grasse stopped by the Wolf Fitness Systems studio for a quick photo and video shoot in preparation for Jim Romig’s Steel club Conditioning for MMA article.This …
We implement a variety of security measures to maintain the safety of your personal information when you place an order or enter, submit, or access any information on our website. We incorporate physical, electronic, and administrative procedures to safeguard the confidentiality of your personal information, including Secure Sockets Layer (SSL) for the encryption of all financial transactions through the website. We use industry-standard, 256bit SSL encryption to protect your personal information online, and we also take several steps to protect your personal information in our facilities. For example, when you visit the website, you access servers that are kept in a secure physical environment, behind a locked cage and a hardware firewall. After a transaction, your credit card information is not stored on our servers.