Filter News
Area of Research
- (-) Building Technologies (2)
- (-) Isotopes (26)
- (-) Supercomputing (74)
- Advanced Manufacturing (6)
- Biology and Environment (58)
- Clean Energy (117)
- Computational Biology (1)
- Computational Engineering (2)
- Computer Science (9)
- Electricity and Smart Grid (3)
- Energy Sciences (1)
- Functional Materials for Energy (1)
- Fusion and Fission (8)
- Fusion Energy (2)
- Isotope Development and Production (1)
- Materials (60)
- Materials for Computing (12)
- National Security (37)
- Neutron Science (16)
- Nuclear Science and Technology (14)
- Quantum information Science (4)
- Sensors and Controls (1)
News Topics
- (-) Cybersecurity (8)
- (-) Grid (5)
- (-) Isotopes (25)
- (-) Machine Learning (14)
- (-) Microscopy (7)
- (-) Molten Salt (1)
- (-) Space Exploration (6)
- (-) Summit (42)
- (-) Sustainable Energy (12)
- 3-D Printing/Advanced Manufacturing (6)
- Advanced Reactors (1)
- Artificial Intelligence (36)
- Big Data (19)
- Bioenergy (9)
- Biology (11)
- Biomedical (22)
- Biotechnology (2)
- Buildings (7)
- Chemical Sciences (5)
- Climate Change (18)
- Computer Science (96)
- Coronavirus (14)
- Critical Materials (3)
- Decarbonization (5)
- Energy Storage (9)
- Environment (22)
- Exascale Computing (22)
- Frontier (28)
- Fusion (1)
- High-Performance Computing (38)
- Irradiation (1)
- Materials (19)
- Materials Science (17)
- Mathematics (1)
- Nanotechnology (11)
- National Security (9)
- Net Zero (1)
- Neutron Science (13)
- Nuclear Energy (7)
- Partnerships (1)
- Physics (7)
- Polymers (2)
- Quantum Computing (19)
- Quantum Science (24)
- Security (5)
- Simulation (14)
- Software (1)
- Transportation (6)
Media Contacts
![ORNL-Lenvio_tech_license_signing_ceremony2 ORNL-Lenvio_tech_license_signing_ceremony2](/sites/default/files/styles/list_page_thumbnail/public/ORNL-Lenvio_tech_license_signing_ceremony2.jpg?itok=xcfN-PbJ)
Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.