Skip to main content
ORNL cybersecurity researchers Jared Smith (left) and Elliot Greenlee (right) participate in a demonstration day event to showcase how Akatosh, a new security analysis tool, quickly sorts through data to identify potential threats.

As technology continues to evolve, cybersecurity threats do as well. To better safeguard digital information, a team of researchers at the US Department of Energy’s (DOE’s) Oak Ridge National Laboratory (ORNL) has developed Akatosh, a security analysis tool that works in conjunctio...

QRNG_photo_ORNL.png

Qrypt, Inc., has exclusively licensed a novel cyber security technology from the Department of Energy’s Oak Ridge National Laboratory, promising a stronger defense against cyberattacks including those posed by quantum computing.

Ryan Kerekes is leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory. Photos by Genevieve Martin, ORNL.

As leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory, Kerekes heads an accelerated lab-directed research program to build virtual models of critical infrastructure systems like the power grid that can be used to develop ways to detect and repel cyber-intrusion and to make the network resilient when disruption occurs.

ORNL’s Frank Combs and Michael Starr of the U.S. Armed Forces (driver) work in ORNL’s Vehicle Security Laboratory to evaluate a prototype device that can detect network intrusions in all modern vehicles. Credit: Carlos Jones/ORNL, U.S. Dept. of Energy

A new Oak Ridge National Laboratory-developed method promises to protect connected and autonomous vehicles from possible network intrusion. Researchers built a prototype plug-in device designed to alert drivers of vehicle cyberattacks. The prototype is coded to learn regular timing...

ORNL-Lenvio_tech_license_signing_ceremony2

Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.