Filter News
Area of Research
- (-) Biological Systems (1)
- (-) Isotopes (27)
- (-) Supercomputing (104)
- Advanced Manufacturing (4)
- Biology and Environment (46)
- Biology and Soft Matter (1)
- Building Technologies (1)
- Clean Energy (54)
- Climate and Environmental Systems (2)
- Computational Biology (2)
- Computational Engineering (3)
- Computer Science (15)
- Fusion and Fission (8)
- Fusion Energy (2)
- Isotope Development and Production (1)
- Materials (83)
- Materials for Computing (15)
- Mathematics (1)
- National Security (23)
- Neutron Science (106)
- Nuclear Science and Technology (14)
- Quantum information Science (6)
News Topics
- (-) Biomedical (23)
- (-) Chemical Sciences (5)
- (-) Computer Science (95)
- (-) Isotopes (25)
- (-) Neutron Science (13)
- (-) Space Exploration (6)
- 3-D Printing/Advanced Manufacturing (5)
- Advanced Reactors (1)
- Artificial Intelligence (36)
- Big Data (19)
- Bioenergy (11)
- Biology (11)
- Biotechnology (2)
- Buildings (4)
- Climate Change (18)
- Coronavirus (14)
- Critical Materials (3)
- Cybersecurity (8)
- Decarbonization (5)
- Energy Storage (9)
- Environment (22)
- Exascale Computing (22)
- Frontier (28)
- Fusion (1)
- Grid (5)
- High-Performance Computing (38)
- Irradiation (1)
- Machine Learning (14)
- Materials (19)
- Materials Science (17)
- Mathematics (1)
- Microscopy (7)
- Molten Salt (1)
- Nanotechnology (11)
- National Security (9)
- Net Zero (1)
- Nuclear Energy (7)
- Partnerships (1)
- Physics (7)
- Polymers (2)
- Quantum Computing (19)
- Quantum Science (24)
- Security (5)
- Simulation (14)
- Software (1)
- Summit (42)
- Sustainable Energy (10)
- Transportation (6)
Media Contacts
![ORNL-Lenvio_tech_license_signing_ceremony2 ORNL-Lenvio_tech_license_signing_ceremony2](/sites/default/files/styles/list_page_thumbnail/public/ORNL-Lenvio_tech_license_signing_ceremony2.jpg?itok=xcfN-PbJ)
Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.