Filter News
Area of Research
- (-) National Security (29)
- (-) Supercomputing (133)
- Advanced Manufacturing (6)
- Biology and Environment (70)
- Building Technologies (2)
- Clean Energy (151)
- Climate and Environmental Systems (1)
- Computational Biology (1)
- Computational Engineering (3)
- Computer Science (16)
- Electricity and Smart Grid (1)
- Energy Frontier Research Centers (1)
- Energy Sciences (2)
- Functional Materials for Energy (2)
- Fusion and Fission (10)
- Fusion Energy (3)
- Isotopes (2)
- Materials (99)
- Materials for Computing (21)
- Mathematics (1)
- Neutron Science (35)
- Nuclear Science and Technology (3)
- Quantum information Science (8)
News Topics
- (-) Computer Science (104)
- (-) Coronavirus (16)
- (-) Energy Storage (9)
- (-) Frontier (28)
- (-) Machine Learning (23)
- (-) Nanotechnology (11)
- (-) Polymers (2)
- (-) Sustainable Energy (12)
- 3-D Printing/Advanced Manufacturing (7)
- Advanced Reactors (2)
- Artificial Intelligence (45)
- Big Data (22)
- Bioenergy (11)
- Biology (14)
- Biomedical (17)
- Biotechnology (3)
- Buildings (4)
- Chemical Sciences (5)
- Climate Change (20)
- Critical Materials (3)
- Cybersecurity (23)
- Decarbonization (6)
- Environment (25)
- Exascale Computing (22)
- Fusion (2)
- Grid (11)
- High-Performance Computing (40)
- Isotopes (1)
- Materials (16)
- Materials Science (17)
- Mathematics (1)
- Microscopy (7)
- Molten Salt (1)
- National Security (35)
- Net Zero (1)
- Neutron Science (15)
- Nuclear Energy (8)
- Partnerships (4)
- Physics (8)
- Quantum Computing (19)
- Quantum Science (25)
- Security (14)
- Simulation (14)
- Software (1)
- Space Exploration (3)
- Summit (42)
- Transportation (8)
Media Contacts
![ORNL-Lenvio_tech_license_signing_ceremony2 ORNL-Lenvio_tech_license_signing_ceremony2](/sites/default/files/styles/list_page_thumbnail/public/ORNL-Lenvio_tech_license_signing_ceremony2.jpg?itok=xcfN-PbJ)
Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.