AI: Keep Your Feet on the Ground

The stunning video of Neil Armstrong effortlessly jumping in his moon boots comes to mind easily. AI feels somewhat like the excitement of the Apollo 11 moon landing in 1967. The hype was huge, but as we know, it has been a long road. 1972 was the last time man walked on the moon, and most recently, NASA’s latest mission to land an unmanned spacecraft on the moon failed.1 AI may evolve more quickly, but perhaps we should keep our earthly boots on and remember the basics.

The adoption of AI will come in fits and starts. Aspen Digital’s paper “Envisioning Cyber Futures with AI” reaches beyond the hype and strikes the right cord, framing “good” and “bad” outcomes. For example, the writers defined a “good place,” where AI helps defenders, versus a “bad place,” where AI helps attackers.2 Most significantly, the report does not abandon the basics: the need to have a synoptic understanding of the health of computer systems, in particular, logging or capturing computer telemetry to help operators understand operations and data integrity.

The report cautions that the “old rules still apply,” and it is vital not to ignore the basics. The report states, “Good logs are essential to cybersecurity, and the potential for AI-driven exploits and attacks only heighten that. Organizations should improve logging, log review, and log maintenance to maximize the ability to detect novel, AI-generated attacks and comply with legally authorized reviews as necessary (including through the use of AI tools).”3 In short, in the world of AI, logging is essential to ensure data integrity.

Our logging capabilities are best leveraged through Splunk’s platform, which addresses security Ops, ITOps, and DevOps, bringing enterprise resilience. Splunk is excited about AI, but we are keeping our boots on the ground as we partner with customers to leverage AI to improve efficiency while continuing the essentials via Splunk’s platform.

1 The Peregrine rocket successfully launched on Jan 8, 2024, however shortly thereafter a propellant leak scuttled the possibility of landing on the moon
2 “Envisioning Cyber Futures with A.I.”, January 2024, Aspen Digital, Aspen Institute
3 Ibid, p.12

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.