IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more
Rene Millman

Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.

Internet providers look to ease cost of living crisis with cheaper broadband
Downing St
broadband

Internet providers look to ease cost of living crisis with cheaper broadband

Social tariffs could get slashed to help poorest in society
29 Jun 2022
What is GPT-4?
A multi-coloured brain made of blocks
artificial intelligence (AI)

What is GPT-4?

The next generation of the OpenAI framework - GPT-4 - might change the face of language modelling
17 Jun 2022
What is SMTP?
SMTP
mail servers

What is SMTP?

Have you ever wondered how your email gets to its recipient?
1 Jun 2022
What is HTTP error 503 and how do you fix it?
A graphic showing the HTTPS symbol
web browser

What is HTTP error 503 and how do you fix it?

It may not always be obvious what's behind a 503 error, but there are steps you can take to get back online
27 May 2022
Uptake for blockchain skills courses surges 450% in 2022
An unidentified person coding on a laptop placed on a bright desk
elearning

Uptake for blockchain skills courses surges 450% in 2022

Udemy study finds employees are also looking to learn more about improving their efficiency at work
26 May 2022
Linux-based Cheerscrypt ransomware found targeting VMware ESXi servers
A smartphone, lying on its side in front of a data graphic, with the word VMware displayed
ransomware

Linux-based Cheerscrypt ransomware found targeting VMware ESXi servers

Cheerscrypt malware could cause severe disruption to companies using the virtualisation software
26 May 2022
17 Windows 10 problems - and how to fix them
Windows 10 error message displayed on a monitor
operating systems

17 Windows 10 problems - and how to fix them

Tips and tricks to help you solve Windows 10 upgrade problems, for everything from freeing up storage, to solving privacy errors and using safe mode
20 May 2022
How to factory reset Windows 10
The Cortona screen on Windows 10
operating systems

How to factory reset Windows 10

If your Windows 10 system isn't playing ball, you can reset it back to its factory conditions
13 May 2022
Reimagining Edinburgh with cutting-edge smart city projects
Landscape photo of the city of Edinburgh at dusk
smart city

Reimagining Edinburgh with cutting-edge smart city projects

With several exciting projects underway, what will Scotland’s capital city look like in five years’ time?
14 Apr 2022
How to rotate a laptop or PC screen
A display in portrait mode
operating systems

How to rotate a laptop or PC screen

Portrait or landscape; how do you get a new perspective on your screen?
8 Apr 2022
How to use Chromecast without Wi-Fi
A Google Chromecast device hanging from a USB port on a TV
Mobile

How to use Chromecast without Wi-Fi

Google’s streaming stick is a great travelling companion, but how can you use Chromecast without Wi-Fi?
5 Apr 2022
The 14 most in-demand tech jobs
A woman holding a laptop sat outside an office building during the day
Careers & training

The 14 most in-demand tech jobs

Looking to future proof your career? These are the roles that are likely to stay relevant for many years to come
4 Apr 2022
The most secure email services of 2022
Secure inbox depicted with code
email providers

The most secure email services of 2022

Email is not secure by design, but these email providers allow you to send emails with top-level security
25 Mar 2022
Optimising the management of hybrid cloud
Somebody motioning to push a button with a cloud symbol
Cloud

Optimising the management of hybrid cloud

Having the right foundations in place can make an organisation’s hybrid cloud infrastructure work much better
23 Mar 2022
The five most secure smartphones
iPhone 12 Pro Max phone on a table with the three camera lenses facing up
Mobile Phones

The five most secure smartphones

These secure smartphones ensure your data and privacy are protected
11 Mar 2022
The best SQL courses of 2022
Rows of SQL code on a computer screen
SQL

The best SQL courses of 2022

Managing and organizing data in business means you need to know SQL, but which course is best?
11 Mar 2022
VMware vSphere vs Proxmox: Which is best for your business?
Graphical depiction of virtualisation with bright lights emerging from servers
virtualisation

VMware vSphere vs Proxmox: Which is best for your business?

Choosing a virtualisation tool can be tricky, so we've pitted two of the most popular head-to-head
25 Feb 2022
What is a 502 bad gateway and how do you fix it?
502 error spelt out in wooden blocks on a grey background
web hosting

What is a 502 bad gateway and how do you fix it?

We explain what this networking error means for users and website owners
11 Feb 2022
How to build a zero trust model
Cyber security represented by a digital screen with encryption data background
Security

How to build a zero trust model

Threats are becoming greater and more diverse, but having a zero trust architecture could help your business defend its infrastructure
11 Jan 2022
Five things to consider before choosing an MFA solution
Image of two-factor authentication in action
Security

Five things to consider before choosing an MFA solution

Because we all should move on from using “password” as a password!
17 Dec 2021
CTO job description: What does a CTO do?
CTO plaque on desk with office chair
Business strategy

CTO job description: What does a CTO do?

More than a glorified IT manager, a CTO can have real clout in an organisation
6 Dec 2021
Could using blockchain kill your green credentials?
Blocks organised in several lines to represent blockchain technology
blockchain

Could using blockchain kill your green credentials?

With Bitcoin transactions consuming enough energy to fuel a small country, can blockchain technology ever be considered environmentally friendly?
1 Dec 2021
More than 90% of IT decision makers reuse passwords
Laptop screen with a man entering a password
Security

More than 90% of IT decision makers reuse passwords

Bitwarden survey also finds that half of IT professionals share their passwords with colleagues
30 Nov 2021
Over 300,000 Android users downloaded banking trojan malware
Trojan virus within binary code
hacking

Over 300,000 Android users downloaded banking trojan malware

Hackers defeated Google Play restrictions by using smaller droppers in apps and eliminating permissions needed
30 Nov 2021
Chinotto spyware spies on North Korean defectors and activists
Computer code on a screen with a skull representing a computer virus / malware attack.
spyware

Chinotto spyware spies on North Korean defectors and activists

Long term operation by ScarCruft hackers has been linked to the North Korean government
30 Nov 2021
Sabbath hackers are targeting US schools and hospitals
Visual representation of ransomware by showing encrypted files on a display
ransomware

Sabbath hackers are targeting US schools and hospitals

The rebranded hacking group is demanding multi-million-dollar ransom payments, according to Mandiant
29 Nov 2021
CronRat Magecart malware uses 31st February date to remain undetected
Cronrat strikes Linux
malware

CronRat Magecart malware uses 31st February date to remain undetected

The malware allows for server-side payment skimming that bypasses browser security
26 Nov 2021
Best C++ courses to kickstart your career
A man with glasses looking at several screens with code on them
software development

Best C++ courses to kickstart your career

If you want to learn C++ for a new job, these are the courses you should consider
26 Nov 2021
Flaw in Android phones could let attackers eavesdrop on calls
A red Android mascot
Google Android

Flaw in Android phones could let attackers eavesdrop on calls

The vulnerable chips are thought to be present in 37% of all smartphones worldwide
26 Nov 2021
Education and government most at risk from email threats
Abstract image of a fishing hook through a red email to represent a phishing attack
phishing

Education and government most at risk from email threats

New report finds phishing remains most dominant threat to IT security
26 Nov 2021
Vodafone to roll out self-sufficient masts powered entirely by renewable energy
The top of a new bird-friendly wind turbine developed by Crossflow
mobile networks

Vodafone to roll out self-sufficient masts powered entirely by renewable energy

Masts will be built in remote locations in the UK following a trial later this year
25 Nov 2021
Microsoft patch fails to fix Installer zero-day affecting every version of Windows
Red lock unlocked among several blue locked locks
zero-day exploit

Microsoft patch fails to fix Installer zero-day affecting every version of Windows

The exploit allows hackers to elevate privileges and create admin accounts
25 Nov 2021
Samsung selects Texas for $17 billion semiconductor factory
A view of Samsung's semiconductor plant in Austin
components

Samsung selects Texas for $17 billion semiconductor factory

New plant to be built in Taylor, just 25km away from Samsung's existing site in Austin
25 Nov 2021
UK gov introduces cyber bill designed to clamp down on unsecure devices
A hacker wearing black gloves using a laptop keyboard
IT regulation

UK gov introduces cyber bill designed to clamp down on unsecure devices

Law could prevent sale of smartphones, TVs, speakers, toys, and other digital devices that fail to meet minimum security requirements
24 Nov 2021
Vast majority of US healthcare web apps vulnerable to attack
A heartbeat monitor displayed inside an operating room
network security

Vast majority of US healthcare web apps vulnerable to attack

Report suggests patient data is at risk from poor security hygiene
24 Nov 2021
Investors warned to be vigilant of fake SEC alerts
The website of the US Securities and Exchange Commission displayed on a web browser
cyber crime

Investors warned to be vigilant of fake SEC alerts

Hackers are targeting victims using phone calls and voice mails about cryptocurrency transactions
22 Nov 2021