Cyber Attacks are becoming increasingly sophisticated, and traditional signature-based detection solutions are giving way to more advanced analytics and behavior analysis. However, many behavior analysis techniques are prone to false positives, and run the risk of further distracting available resources. The problem may not be the methodology but the information being analyzed.