Filter News
Area of Research
- (-) National Security (35)
- (-) Supercomputing (137)
- Advanced Manufacturing (3)
- Biology and Environment (93)
- Building Technologies (1)
- Clean Energy (79)
- Climate and Environmental Systems (2)
- Computational Biology (2)
- Computational Engineering (3)
- Computer Science (15)
- Electricity and Smart Grid (3)
- Functional Materials for Energy (1)
- Fusion and Fission (27)
- Fusion Energy (13)
- Isotopes (1)
- Materials (46)
- Materials for Computing (9)
- Mathematics (1)
- Neutron Science (22)
- Nuclear Science and Technology (14)
- Quantum information Science (9)
- Sensors and Controls (1)
News Type
News Topics
- (-) Biology (14)
- (-) Computer Science (104)
- (-) Frontier (28)
- (-) Fusion (2)
- (-) Grid (11)
- (-) Machine Learning (23)
- (-) Molten Salt (1)
- (-) Quantum Science (25)
- 3-D Printing/Advanced Manufacturing (7)
- Advanced Reactors (2)
- Artificial Intelligence (45)
- Big Data (22)
- Bioenergy (11)
- Biomedical (17)
- Biotechnology (3)
- Buildings (4)
- Chemical Sciences (5)
- Climate Change (20)
- Coronavirus (16)
- Critical Materials (3)
- Cybersecurity (23)
- Decarbonization (6)
- Energy Storage (9)
- Environment (25)
- Exascale Computing (22)
- High-Performance Computing (40)
- Isotopes (1)
- Materials (16)
- Materials Science (17)
- Mathematics (1)
- Microscopy (7)
- Nanotechnology (11)
- National Security (35)
- Net Zero (1)
- Neutron Science (15)
- Nuclear Energy (8)
- Partnerships (4)
- Physics (8)
- Polymers (2)
- Quantum Computing (19)
- Security (14)
- Simulation (14)
- Software (1)
- Space Exploration (3)
- Summit (42)
- Sustainable Energy (12)
- Transportation (8)
Media Contacts
![ORNL-Lenvio_tech_license_signing_ceremony2 ORNL-Lenvio_tech_license_signing_ceremony2](/sites/default/files/styles/list_page_thumbnail/public/ORNL-Lenvio_tech_license_signing_ceremony2.jpg?itok=xcfN-PbJ)
Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.