Content Retrieve Api
GET /api/content/f62592e0-8f78-46e2-887c-2f52716be127/?format=api
{ "content_customizations": null, "shortcut_customizations": [ { "id": 3510, "created_at": "2022-11-09T13:23:25.595978Z", "updated_at": "2022-11-09T13:23:25.604104Z", "action": "DOWNLOAD", "color": "#FFFFFF", "icon_url": "https://app-media-production.s3.amazonaws.com/client_docs/client_documents/557/shortcut_customizations/35ee1c336c71499bad0f609be644ca37/download_icon.svg", "additional_data": { "download_url": "https://media.celero.io/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/original_file.pdf" }, "content": 4214 } ], "content_thumbnail": { "original": "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/thumbnails/1.jpg", "high_quality": { "small": "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/thumbnails_high_quality/1.jpg", "medium": "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/thumbnails_high_quality/1_medium.jpg", "large": "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/thumbnails_high_quality/1_large.jpg", "microsite_preview": "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/thumbnails_high_quality/preview.jpg" } }, "version": { "version_number": 1, "version_details": { "uuid": "f62592e0-8f78-46e2-887c-2f52716be127", "name": " Cognyte_TL_3_Key_Trends_WP_EN", "is_live": true, "access_control": { "min_stage": "EVERYONE_ALLOWED", "stage_options": { "UNVERIFIED_CONTACT": { "form_preview": "LANDING_PAGE", "form_id": "default" }, "VERIFIED_CONTACT": { "form_preview": "LANDING_PAGE" }, "GDPR_CONSENT": {}, "PRIVATE": {}, "EVERYONE_ALLOWED": {} } }, "base_shorten": "28eb9f77", "tags": [] }, "is_active": true, "type": "DESKTOP", "version": "f62592e0-8f78-46e2-887c-2f52716be127", "content_uuid": "f62592e0-8f78-46e2-887c-2f52716be127", "version_id": "f62592e0-8f78-46e2-887c-2f52716be127" }, "custom_events": [], "content_action": null, "content_stats": null, "content_meta_tags": { "url_title": "security-trends-whitepaper-2022", "title": "3 Key Trends in 2022", "description": "INVESTIGATIVE ANALYTICS DRIVING THE NEED FOR 3 KEY TRENDS IN 2022 ", "og_enabled": true, "seo_enabled": false, "version": "f62592e0-8f78-46e2-887c-2f52716be127" }, "keywords": [], "seo_content_version_name": "-cognyte-tl-3-key-trends-wp-en", "html_snippets": null, "is_live": true, "shorten": "https://engage.cognyte.com/s/28eb9f77/", "base_url": "/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7", "config": { "pagecount": 14, "bounds": [ [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ] ] }, "annotations": { "pages": [ { "page": 14, "annotations": [ { "type": "TextLink", "bounds": [ 69, 596, 365, 12 ], "action": { "type": "URI", "uri": "https://www.europol.europa.eu/socta/2017/drivers-of-crime.html" } }, { "type": "TextLink", "bounds": [ 72, 622, 465, 12 ], "action": { "type": "URI", "uri": "https://go.chainalysis.com/rs/503-FAP-074/images/2020-Crypto-Crime-Report.pdf" } }, { "type": "TextLink", "bounds": [ 72, 648, 610, 12 ], "action": { "type": "URI", "uri": "https://www.researchgate.net/publication/227273142_Devious_Chatbots_-_Interactive_Malware_with_a_Plot" } }, { "type": "TextLink", "bounds": [ 72, 674, 465, 12 ], "action": { "type": "URI", "uri": "https://www.fbi.gov/news/testimony/worldwide-threats-to-the-homeland-092420" } }, { "type": "TextLink", "bounds": [ 72, 700, 500, 12 ], "action": { "type": "URI", "uri": "https://info.claroty.com/the-critical-convergence-of-it-and-ot-security-in-a-global-crisis" } }, { "type": "TextLink", "bounds": [ 72, 778, 292, 12 ], "action": { "type": "URI", "uri": "https://www.seagate.com/our-story/data-age-2025/" } }, { "type": "TextLink", "bounds": [ 72, 804, 341, 12 ], "action": { "type": "URI", "uri": "https://www.idc.com/getdoc.jsp?containerId=prUS46286020" } }, { "type": "TextLink", "bounds": [ 77, 830, 651, 12 ], "action": { "type": "URI", "uri": "https://www.tampabay.com/news/military/macdill/SOCom-leader-wanted-to-toss-Google-exec-from-car-Because" } }, { "type": "TextLink", "bounds": [ 74, 874, 231, 12 ], "action": { "type": "URI", "uri": "https://fas.org/sgp/crs/natsec/R45178.pdf" } }, { "type": "TextLink", "bounds": [ 77, 900, 483, 12 ], "action": { "type": "URI", "uri": "https://fedtechmagazine.com/article/2018/12/cia-cio-sees-data-tip-spear-intelligence" } }, { "type": "TextLink", "bounds": [ 77, 926, 651, 12 ], "action": { "type": "URI", "uri": "https://www.theguardian.com/world/2020/nov/04/police-investigate-if-vienna-attacker-was-part-of-wider-network" } }, { "type": "TextLink", "bounds": [ 77, 952, 610, 12 ], "action": { "type": "URI", "uri": "https://ndupress.ndu.edu/Media/News/News-Article-View/Article/1566262/intelligence-in-a-data-driven-age" } }, { "type": "Link", "bounds": [ 70, 594, 362, 17 ], "objref": "42", "action": { "type": "URI", "uri": "https://www.europol.europa.eu/socta/2017/drivers-of-crime.htm" } }, { "type": "Link", "bounds": [ 72, 646, 610, 17 ], "objref": "43", "action": { "type": "URI", "uri": "https://www.researchgate.net/publication/227273142_Devious_Chatbots_-_Interactive_Malware_with_a_Plot" } }, { "type": "Link", "bounds": [ 74, 672, 466, 17 ], "objref": "44", "action": { "type": "URI", "uri": "https://www.fbi.gov/news/testimony/worldwide-threats-to-the-homeland-092420" } }, { "type": "Link", "bounds": [ 74, 698, 500, 17 ], "objref": "45", "action": { "type": "URI", "uri": "https://info.claroty.com/the-critical-convergence-of-it-and-ot-security-in-a-global-crisis" } }, { "type": "Link", "bounds": [ 74, 776, 297, 17 ], "objref": "46", "action": { "type": "URI", "uri": "https://www.seagate.com/our-story/data-age-2025/ " } }, { "type": "Link", "bounds": [ 74, 802, 345, 17 ], "objref": "47", "action": { "type": "URI", "uri": "https://www.idc.com/getdoc.jsp?containerId=prUS46286020 " } }, { "type": "Link", "bounds": [ 78, 828, 656, 17 ], "objref": "48", "action": { "type": "URI", "uri": "https://www.tampabay.com/news/military/macdill/SOCom-leader-wanted-to-toss-Google-exec-from-car-Because he-was-right-_167629195/" } }, { "type": "Link", "bounds": [ 77, 847, 147, 17 ], "objref": "49", "action": { "type": "URI", "uri": "https://www.tampabay.com/news/military/macdill/SOCom-leader-wanted-to-toss-Google-exec-from-car-Because he-was-right-_167629195/" } }, { "type": "Link", "bounds": [ 75, 873, 232, 17 ], "objref": "50", "action": { "type": "URI", "uri": "https://fas.org/sgp/crs/natsec/R45178.pdf" } }, { "type": "Link", "bounds": [ 77, 899, 484, 17 ], "objref": "51", "action": { "type": "URI", "uri": "https://fedtechmagazine.com/article/2018/12/cia-cio-sees-data-tip-spear-intelligence" } }, { "type": "Link", "bounds": [ 77, 924, 657, 17 ], "objref": "52", "action": { "type": "URI", "uri": "https://www.theguardian.com/world/2020/nov/04/police-investigate-if-vienna-attacker-was-part-of-wider-network " } }, { "type": "Link", "bounds": [ 77, 950, 611, 17 ], "objref": "53", "action": { "type": "URI", "uri": "https://ndupress.ndu.edu/Media/News/News-Article-View/Article/1566262/intelligence-in-a-data-driven-age" } }, { "type": "Link", "bounds": [ 55, 370, 122, 41 ], "objref": "54", "action": { "type": "URI", "uri": "https://www.cognyte.com/" } }, { "type": "Link", "bounds": [ 54, 362, 130, 55 ], "objref": "55", "action": { "type": "URI", "uri": "https://www.cognyte.com/contact/" } } ] } ] }, "created_at": "2022-11-09T13:23:25.343124Z", "updated_at": "2026-02-22T10:38:44.723199Z", "original_name": "Security_trends_whitepaper_2022_with_Vienna.pdf", "uuid": "f62592e0-8f78-46e2-887c-2f52716be127", "description": "INVESTIGATIVE ANALYTICS DRIVING THE NEED FOR 3 KEY TRENDS IN 2022 ", "is_high_quality_thumbnails_available": true, "conversion_type": "DOCUMENT" }