Filter News
Area of Research
- (-) Isotopes (24)
- (-) Materials (54)
- (-) Supercomputing (49)
- Advanced Manufacturing (2)
- Biology and Environment (23)
- Clean Energy (24)
- Computational Biology (1)
- Computational Engineering (2)
- Computer Science (7)
- Electricity and Smart Grid (1)
- Functional Materials for Energy (1)
- Fusion and Fission (3)
- Materials for Computing (1)
- Mathematics (1)
- National Security (28)
- Neutron Science (18)
- Nuclear Science and Technology (8)
- Quantum information Science (2)
News Topics
- (-) Artificial Intelligence (38)
- (-) Clean Water (3)
- (-) Cybersecurity (8)
- (-) Isotopes (33)
- (-) Physics (34)
- 3-D Printing/Advanced Manufacturing (26)
- Advanced Reactors (5)
- Big Data (19)
- Bioenergy (18)
- Biology (14)
- Biomedical (26)
- Biotechnology (2)
- Buildings (8)
- Chemical Sciences (32)
- Climate Change (21)
- Composites (9)
- Computer Science (98)
- Coronavirus (17)
- Critical Materials (15)
- Decarbonization (11)
- Energy Storage (37)
- Environment (34)
- Exascale Computing (22)
- Frontier (28)
- Fusion (8)
- Grid (9)
- High-Performance Computing (40)
- Irradiation (2)
- ITER (1)
- Machine Learning (14)
- Materials (79)
- Materials Science (83)
- Mathematics (1)
- Microscopy (29)
- Molten Salt (3)
- Nanotechnology (42)
- National Security (9)
- Net Zero (2)
- Neutron Science (42)
- Nuclear Energy (23)
- Partnerships (11)
- Polymers (18)
- Quantum Computing (20)
- Quantum Science (32)
- Renewable Energy (1)
- Security (6)
- Simulation (14)
- Software (1)
- Space Exploration (7)
- Summit (42)
- Sustainable Energy (19)
- Transformational Challenge Reactor (3)
- Transportation (19)
Media Contacts
![ORNL-Lenvio_tech_license_signing_ceremony2 ORNL-Lenvio_tech_license_signing_ceremony2](/sites/default/files/styles/list_page_thumbnail/public/ORNL-Lenvio_tech_license_signing_ceremony2.jpg?itok=xcfN-PbJ)
Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.