OpenAI Boosts Cyber Defense with GPT-5.5

OpenAI unveils GPT-5.5 and GPT-5.5-Cyber, leveraging a 'Trusted Access for Cyber' framework to empower AI-assisted cybersecurity defenses.

Abstract representation of AI and cybersecurity network connections.
OpenAI's new GPT-5.5 models aim to bolster cyber defense capabilities.· OpenAI News

OpenAI is doubling down on cybersecurity defense with the release of its latest models, GPT-5.5 and a specialized GPT-5.5-Cyber. This move signals a significant push to equip security professionals with advanced AI tools, as detailed in their recent announcement on OpenAI News.

The core of this initiative is the 'Trusted Access for Cyber' (TAC) framework. This identity and trust-based system vets cybersecurity professionals, allowing them to leverage GPT-5.5's capabilities for defensive tasks with fewer restrictions. This program is designed to empower verified defenders through Trusted Access for Cyber, while maintaining safeguards against malicious use.

Tiered Access for Cyber Defense

GPT-5.5, the general-purpose model, comes with standard safety protocols suitable for a wide range of tasks, including developer and knowledge work. For verified defenders, GPT-5.5 with TAC offers more precise safeguards, enabling critical workflows like secure code review, vulnerability triage, and malware analysis.

Related startups

The new GPT-5.5-Cyber model, currently in limited preview for those securing critical infrastructure, represents the most permissive tier. It's intended for specialized cybersecurity workflows such as authorized red teaming and penetration testing, requiring stronger verification and account-level controls.

Accelerating the Security Flywheel

OpenAI aims to enhance the entire security ecosystem, from vulnerability discovery to network enforcement. GPT-5.5 with TAC is positioned as the starting point for most defensive work, assisting in tasks like patch validation and secure code review. The more permissive GPT-5.5-Cyber will allow a smaller group of partners to explore advanced workflows under stricter oversight.

The company is actively partnering with security vendors across various domains. These partnerships focus on integrating AI capabilities into discovery, development, detection, and response stages to create a faster 'security flywheel'.

Vulnerability Research and Patching

For vulnerability research and patching, GPT-5.5 with TAC can assist in understanding code, identifying affected systems, and reviewing patches. Specialized workflows requiring more permissive behavior, like creating exploit proof-of-concepts for coordinated disclosure, will utilize GPT-5.5-Cyber.

This initiative is part of OpenAI's broader vision outlined in their AI Cybersecurity in the Intelligence Age plan.

Detection, Monitoring, and Supply Chain Security

In detection and monitoring, GPT-5.5 can help analysts connect security signals, summarize threats, and draft detection rules. For software supply chain security, the models can inspect dependency changes and reason about exploitability in owned code, aiming to prevent known-bad code from entering production.

OpenAI emphasizes that GPT-5.5-Cyber's initial preview is not about significantly increasing raw cyber capability over GPT-5.5. Instead, it's about enabling safer, more iterative deployment for specialized workflows that require greater permissiveness, backed by robust verification and monitoring.

© 2026 StartupHub.ai. All rights reserved. Do not enter, scrape, copy, reproduce, or republish this article in whole or in part. Use as input to AI training, fine-tuning, retrieval-augmented generation, or any machine-learning system is prohibited without written license. Substantially-similar derivative works will be pursued to the fullest extent of applicable copyright, database, and computer-misuse laws. See our terms.