Filter News
Area of Research
- (-) Fusion Energy (1)
- (-) Neutron Science (9)
- (-) Supercomputing (43)
- Advanced Manufacturing (2)
- Biology and Environment (21)
- Clean Energy (36)
- Computational Engineering (1)
- Computer Science (1)
- Electricity and Smart Grid (1)
- Functional Materials for Energy (1)
- Fusion and Fission (4)
- Isotope Development and Production (1)
- Isotopes (26)
- Materials (41)
- Materials for Computing (8)
- Mathematics (1)
- National Security (28)
- Nuclear Science and Technology (9)
- Quantum information Science (2)
- Sensors and Controls (1)
News Topics
- (-) Clean Water (2)
- (-) Cybersecurity (9)
- (-) Frontier (29)
- (-) Isotopes (1)
- (-) Polymers (3)
- (-) Security (6)
- (-) Space Exploration (5)
- 3-D Printing/Advanced Manufacturing (11)
- Advanced Reactors (9)
- Artificial Intelligence (39)
- Big Data (20)
- Bioenergy (13)
- Biology (14)
- Biomedical (25)
- Biotechnology (2)
- Buildings (4)
- Chemical Sciences (6)
- Climate Change (17)
- Composites (1)
- Computer Science (99)
- Coronavirus (17)
- Critical Materials (3)
- Decarbonization (7)
- Energy Storage (14)
- Environment (28)
- Exascale Computing (22)
- Fossil Energy (1)
- Fusion (14)
- Grid (5)
- High-Performance Computing (39)
- Machine Learning (16)
- Materials (29)
- Materials Science (35)
- Mathematics (1)
- Microscopy (8)
- Molten Salt (1)
- Nanotechnology (19)
- National Security (8)
- Net Zero (1)
- Neutron Science (101)
- Nuclear Energy (17)
- Partnerships (1)
- Physics (16)
- Quantum Computing (19)
- Quantum Science (29)
- Simulation (14)
- Software (1)
- Summit (42)
- Sustainable Energy (12)
- Transportation (10)
Media Contacts
![ORNL-Lenvio_tech_license_signing_ceremony2 ORNL-Lenvio_tech_license_signing_ceremony2](/sites/default/files/styles/list_page_thumbnail/public/ORNL-Lenvio_tech_license_signing_ceremony2.jpg?itok=xcfN-PbJ)
Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.