Hydrogen

Creating technologies to enable hydrogen mobility and make hydrogen aircraft a reality
Discover more

Hydrogen is poised to play a crucial role in global decarbonisation – particularly when it comes to harder-to-abate emissions from the mobility and industrial sectors.

But scaling green hydrogen will require significant investment in renewable energy production systems, electrolysers, fuel cells, transport, storage infrastructure and more. At the same time, increasing the social acceptance of hydrogen mobility and hydrogen aircraft requires continued cross-industry collaboration.

Our impact

To unlock the potential of green hydrogen, safety issues around hydrogen mobility and hydrogen aircraft need to be addressed. Our ISO 26000-compliant consultants have an extensive track record of securing critical infrastructure and are well-versed in ESG reporting frameworks, global risk assessment methodologies and sustainable development legislation.

Our holistic approach encompasses design, testing, production, operation, maintenance and recycling, and spans the entire hydrogen value chain – production, transportation, liquefaction, gas treatment and storage.

We’re playing a key role in Airbus’ ground-breaking ZEROe initiative, which is creating the world’s first zero-emissions hydrogen aircraft. As part of the initiative, Airbus Protect is building safe and secure hydrogen supply chains through the modelling and analysis of H2 and LH2 phenomena.

Speak to our hydrogen mobility and hydrogen aircraft experts

Get in touch to find out how we can support you.

Find the right solution

What's new?

Filter
Blog A year on from the NHS Ransomware attack

A year on from the NHS Ransomware Attack

What happened to the NHS a year ago? Let’s find out with Gareth, CTI & Vulnerability Lead at Airbus Protect Introduction to NHS Ransomware Attack A year has passed since the NHS fell victim to a further major ransomware attack which saw their critical NHS 111 service being taken offline alongside management systems for GP […]

Blog Cyber Threat Intelligence Part 2

Cyber Threat Intelligence Part 2 : How to support SOC’s Threat Hunting & Detection Engineering efforts

Introduction In the first part of this CTI focused blog posts series, we introduced the Intelligence Production Cycle and proposed a functional & technical architecture for a Cyber Threat Intelligence Platform integrated into and supporting both SOC and Incident Response (IR) operations.  This second part will focus on how Cyber Threat Intelligence can contribute and [...]

Blog code lignes

Think twice before implementing encryption

As we’ve seen before[*], encryption is a protection means rather than a security objective. Strong of that knowledge, we have clearly defined who should have access to our data, and who should not. Is encryption a good solution, then? Security attributes are often summed in three, sometimes four, basic properties that we may need to […]