{"id":5141,"date":"2026-04-16T03:37:04","date_gmt":"2026-04-16T03:37:04","guid":{"rendered":"https:\/\/ft365.org\/index.php\/2026\/04\/16\/openai-unveils-gpt-5-4-cyber-for-improving-cyber-defense-with-ai\/"},"modified":"2026-04-16T03:37:04","modified_gmt":"2026-04-16T03:37:04","slug":"openai-unveils-gpt-5-4-cyber-for-improving-cyber-defense-with-ai","status":"publish","type":"post","link":"https:\/\/ft365.org\/index.php\/2026\/04\/16\/openai-unveils-gpt-5-4-cyber-for-improving-cyber-defense-with-ai\/","title":{"rendered":"OpenAI Unveils GPT-5.4-Cyber for Improving Cyber Defense With AI"},"content":{"rendered":"<div>\n<p><img decoding=\"async\" src=\"https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/localimages\/cb531640-ce34-4e47-96c8-4a9f811ec92a.jpg?width=64&#038;height=64&#038;mode=crop&#038;scale=both&#038;format=webp\" alt=\"Photo of Danny  Palmer \" loading=\"lazy\"><\/p>\n<\/div>\n<div id=\"cphContent_pnlArticleBody\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>OpenAI has launched a new large language model (LLM) focused on use cases for cybersecurity and expanded its Trusted Access for Cyber (TAC) program, as the AI company behind ChatGPT looks to enhance how its models can be deployed for cyber defense capabilities.<\/p>\n<p>In a blog post which announced the expanded TAC program, published April 14, OpenAI revealed GPT\u20115.4\u2011Cyber, a variant of GPT 5.4 which has been trained to be \u201ccyber-permissive\u201d and \u201cfine-tuned for cybersecurity use cases.\u201d<\/p>\n<p>Initially revealed in February, the OpenAI Trusted Access for Cyber Program was designed to automate identity verification to help reduce the friction of safeguards on cybersecurity-related tasks and partner with a limited set of organizations.<\/p>\n<p>This has since been followed by the Anthropic launch of Claude Mythos Preview and Project Glasswing, an initiative designed to discover and fix cybersecurity vulnerabilities in software with the aid of LLMs. \u00a0<\/p>\n<p>Now, OpenAI has opted to publicly announce the expansion of its own program, following what the company described as \u201cmany months of iterative improvement.\u201d<\/p>\n<p>The company said that it has chosen a staggered release for GPT\u20115.4\u2011Cyber so that it can \u201clearn the most by\u00a0putting these systems into the world carefully\u2060\u201d to help understand the potential benefits and risks.<\/p>\n<p><em>Read more: <\/em><em>AI Companies to Play Bigger Role in CVE Program, Says CISA<\/em><\/p>\n<p>The expansion of TAC sees the introduction of additional tiers to the program, with the highest tiers reserved exclusively for \u201cusers willing to work with OpenAI to authenticate themselves as cybersecurity defenders.\u201d<\/p>\n<h2><strong>New Capabilities for Cyber Defenders<\/strong><\/h2>\n<p>In return, users will gain access to a frontier model: \u201cThis is a version of GPT\u20115.4 which lowers the refusal boundary for legitimate cybersecurity work and enables new capabilities for advanced defensive workflows.\u201d<\/p>\n<p>While the expanded tools are currently only available to vetted security vendors, organizations and researchers, OpenAI said it wants to \u201cmake these tools as widely available as possible while preventing misuse.\u201d<\/p>\n<p>That is why the company has announced a requirement for stronger verification processes to ensure that the cyber defense capabilities of the model can\u2019t be abused.<\/p>\n<p>\u201cCyber capabilities are inherently dual use, so risk isn\u2019t defined by the model alone,\u201d the company said, in reference to how malicious cyber-attackers have also look for ways to enhance their capabilities with AI.<\/p>\n<p>The new model is also a reaction to what OpenAI described as \u201csteady improvements in agentic coding\u201d and the \u201cdirect implications for cybersecurity\u201d this has.<\/p>\n<p>The company has also called for software development itself to be more secure and views GPT\u20115.4\u2011Cyber and TAC can help improve this.<\/p>\n<p>\u201cThe strongest ecosystem is one that continuously identifies, validates and fixes security issues as software is written,\u201d said the blog post.<\/p>\n<p>\u201cBy integrating advanced coding models and agentic capabilities into developer workflows, we can give developers immediate, actionable feedback while they are building, shifting security from episodic audits and static bug inventories to ongoing, tangible risk reduction.\u201d<\/p>\n<p><em>Image credit: Samuel Boivin \/ Shutterstock.com<\/em><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>OpenAI has launched a new large language model (LLM) focused on use cases for cybersecurity and expanded its Trusted Access for Cyber (TAC) program, as the AI company behind ChatGPT looks to enhance how its models can be deployed for cyber defense capabilities. In a blog post which announced the expanded TAC program, published April<\/p>\n","protected":false},"author":2,"featured_media":5142,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5141","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5141-ca471799-0488-4dc3-b193-26d165d68c40.jpg",300,300,false],"thumbnail":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5141-ca471799-0488-4dc3-b193-26d165d68c40-150x150.jpg",150,150,true],"medium":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5141-ca471799-0488-4dc3-b193-26d165d68c40.jpg",300,300,false],"medium_large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5141-ca471799-0488-4dc3-b193-26d165d68c40.jpg",300,300,false],"large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5141-ca471799-0488-4dc3-b193-26d165d68c40.jpg",300,300,false],"1536x1536":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5141-ca471799-0488-4dc3-b193-26d165d68c40.jpg",300,300,false],"2048x2048":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5141-ca471799-0488-4dc3-b193-26d165d68c40.jpg",300,300,false],"morenews-featured":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5141-ca471799-0488-4dc3-b193-26d165d68c40.jpg",300,300,false],"morenews-large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5141-ca471799-0488-4dc3-b193-26d165d68c40.jpg",300,300,false],"morenews-medium":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5141-ca471799-0488-4dc3-b193-26d165d68c40.jpg",300,300,false],"crawlomatic_preview_image":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5141-ca471799-0488-4dc3-b193-26d165d68c40-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"https:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"https:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/5141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=5141"}],"version-history":[{"count":0,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/5141\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/5142"}],"wp:attachment":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=5141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=5141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=5141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}