Hydrogen Fuel Cell Powered Warehouse Trucks

Hydrogen fuel cell developer Intelligent Energy is supporting the ‘Lighter than Aire’ (LtA) Hydrogen Valley project by powering a fleet of up to 40 warehousing trucks across two major logistics hubs in Yorkshire and Humber.

Backed by the EU through the Clean Hydrogen Partnership, the €20 million LtA project aims to accelerate large-scale hydrogen adoption across logistics, industry and mobility. Centred around the River Aire between Bradford and Leeds and positioned along a key transport route connecting Liverpool and Hull, the project focuses on real world deployment in one of the UK’s busiest logistics corridors.

As a programme partner, Intelligent Energy – working alongside Briggs Equipment UK Ltd, a UK distributor for Hyster-Yale Materials Handling – will deploy fuel cell powered forklift trucks equipped with its IE LIFT™ battery box replacement (BBR) units. The trucks will enter operation from June 2028 and will support warehousing across two major logistics hubs in the valley.

IE-LIFT is a drop-in replacement for traditional industrial battery tanks, integrating a fuel cell, buffer battery and hydrogen storage into a single compact unit. Refuelling takes around three minutes, eliminating long charging cycles while retaining the quiet, zero-emission operation of electric drive. IE’s systems are already in commercial use in demanding environments, including BMW’s manufacturing sites in Germany.

Each IE-LIFT system offers more than 30,000 hours of service life and integrates seamlessly into a wide range of standard forklift classes without compromising payload capacity or manoeuvrability. David Fields, Head of Product Line, IE-POWER at Intelligent Energy, said:

“The US market has set the pace in hydrogen intralogistics, with fuel cell-powered forklift trucks operating at Walmart, Amazon and other major organisations over the past decade. Our fuel cells are proven to be robust, durable and efficient, following a successful deployment at BMW’s Leipzig plant since 2023. This project gives us the opportunity to deploy our IE-LIFT technology on home soil, and to demonstrate its value to operators across Europe.”

The LtA Hydrogen Valley aims to remove barriers to hydrogen adoption by linking production, distribution and end use within a single regional ecosystem. In addition to material handling, the project will support the rollout of more than 150 hydrogen passenger transport vehicles, with the aim of achieving near- diesel operating cost parity through centralised supply.

By embedding hydrogen-powered equipment within active logistics sites, the project will demonstrate hydrogen’s potential to cut emissions while improving operational efficiency. For Intelligent Energy, the deployment marks a step towards wider adoption of hydrogen fuel cells in UK warehousing and intralogistics – sectors where fast refuelling, predictable duty cycles and high utilisation make hydrogen a strong operational fit.

Cybersecurity in Logistics isn’t just IT Responsibility

For many years, cybersecurity was seen as a technical topic. Something for IT to manage in the background. Firewalls, patches, antivirus software. Necessary, but not strategic. That time has passed, writes Andreas Anyuru (pictured below), CTO of Consafe Logistics.

Today, warehouse management systems and supply chain platforms are deeply embedded in business operations. They control goods flows, automation, robotics, transport bookings and customer deliveries. When they stop, operations stop. Revenue stops. Customer trust is tested.

Cybersecurity in logistics is therefore no longer an IT issue. It is a business continuity issue. A board level issue. A leadership issue.

A new risk landscape for supply chains

We often read about ransomware attacks or large scale data breaches in the news. What is less visible is how these incidents usually begin. They rarely start with a dramatic break in. More often, they begin quietly with a known vulnerability in widely used technology.

A vendor releases a security patch. Some companies update immediately. Others postpone. Operations are running. Peak season is approaching. Testing takes time. The upgrade is moved to the next quarter.
Meanwhile, attackers automate their scans. They look for systems that have not been updated. And they find them.

In supply chain environments, the consequences are amplified. A warehouse management system does not only manage data. It controls physical operations. Conveyors, sorters, robotics, picking flows. Many run 24/7. Stopping them is not like restarting an office application. It can mean delayed deliveries, contractual penalties and reputational damage.

Several automotive manufacturers in Asia and the UK have in recent years had to halt production for weeks following cyber incidents. In some cases, the affected systems were believed to be isolated. The financial impact was significant. The operational impact even more so. The lesson is clear. Isolation is not protection. Complexity is not security.

Is supply chain lagging behind?

Many tier 1 and tier 2 companies in Europe have made impressive investments in automation, digitalization and integration. WMS platforms are connected to ERP, transport management systems, automation providers and cloud services. This connectivity drives efficiency and visibility across the value chain. But connectivity also increases the attack surface.

At the same time, we still see environments running on legacy platforms that are no longer supported. Upgrades are postponed because operations are stable. “If it works, why change it?” is an understandable question from an operational perspective. From a cybersecurity perspective, it is a growing liability.

A recent example illustrates this well. A serious vulnerability was disclosed in a widely used framework behind many modern applications. A patch was released immediately. For companies running supported platforms, the vulnerability could be mitigated as part of normal maintenance. For those on unsupported platforms, there was no patch available. The exposure remained.

The vulnerability itself was not unique. New ones will continue to appear. The real difference was the ability to respond.

Cybersecurity maturity is about response

No company can guarantee that vulnerabilities will never occur. What defines maturity is the ability to act when they do.

This requires more than tools. It requires governance, processes and alignment between IT and operations. It requires clarity on who owns risk. It requires a clear upgrade path and the discipline to follow it.

It also requires recognizing that cybersecurity is a continuous investment, not a one time project.
Standards such as ISO 27001 provide a structured way to work with information security. Regular audits, threat modeling, secure development practices and penetration testing all contribute to reducing risk over time. Real time monitoring of SaaS environments and automated vulnerability scanning help detect suspicious behavior early.

But even the most robust framework cannot compensate for outdated, unsupported software. If a platform cannot be updated, it cannot be secured.

Questions every leadership team should ask

For C level leaders in supply chain intensive businesses, the conversation needs to shift from technical detail to strategic oversight. Some important questions to reflect on:
• Do we know which of our critical supply chain systems are running on supported platforms?
• How quickly can we apply security patches without disrupting operations?
• Is there a clear, funded roadmap for upgrades and modernization?
• Are IT and operations aligned on risk ownership and incident response?
• Do we regularly test our resilience, not only our prevention?
These are not IT questions. They are business resilience questions.

Why this matters now

Supply chains are more digital, more connected and more automated than ever. At the same time, geopolitical uncertainty and organized cybercrime are increasing. Attackers understand the leverage in disrupting logistics. When goods stop moving, the impact cascades quickly across industries.

Trust is hard to build and easy to lose. Customers expect reliability. Investors expect stability. Regulators expect due diligence. Cybersecurity in logistics is therefore about protecting more than systems. It is about protecting operations, reputation and long-term competitiveness.

A shared responsibility

We believe that cybersecurity in supply chain environments must be treated as a shared responsibility between technology providers and customers. Vendors must design secure, updateable platforms and work systematically with security. Customers must prioritize supported environments and continuous improvement.

Together, we can move the discussion from reacting to incidents to building resilience. Because the real question is no longer whether cyber threats will continue to grow. They will. The real question is whether our supply chains are prepared to respond. And that is a leadership decision.

Subscribe

Get notified about New Episodes of our Podcast, New Magazine Issues and stay updated with our Weekly Newsletter.