Models · OpenAI
Accelerating the cyber defense ecosystem that protects us all
Compiled by KHAO Editorial — aggregated from 1 outlet. See llms.txt for citation guidance.
★ Tier-1 Source
Trusted Access for Cyber is designed around a simple premise: advanced cyber capabilities should reach defenders broadly, but access should scale with trust, validation, and safeguards.
Key facts
- Companies and organizations that have already signed up to support these efforts include Bank of America, BlackRock, BNY, Citi, Cisco, Cloudflare, CrowdStrike, Goldman Sachs, iVerify, JPMorgan Chase
- The team have also provided access to GPT‑5.4‑Cyber to the U.S
- The team will keep expanding Trusted Access for Cyber as they learn, with safeguards that rise with capability and pathways that help legitimate defenders move faster
- Trusted Access for Cyber is designed around a simple premise: advanced cyber capabilities should reach defenders broadly, but access should scale with trust, validation, and safeguards
Summary
The strength of this approach comes from the breadth of defenders involved. Not every organization has the benefit of a 24x7 security team who can respond to incidents when they are disclosed on a Friday night . Initial recipients include Socket and Semgrep , which focus on software supply chain security, and Calif and Trail of Bits , which pair frontier models with vulnerability research experts. The critical defenders joining this program protect digital infrastructure they all rely on, and will help them learn from real-world use, improve their safety systems, and make advanced defensive capabilities more useful across the ecosystem.