4

Scaling Trusted Access for Cyber with GPT‑5.5 and GPT‑5.5‑Cyber