
Analysts Offer Insights on Consumer Goods Companies: Nestlé SA (OtherNSRGF) and Bj's Wholesale Club Holdings (BJ)
There's a lot to be optimistic about in the Consumer Goods sector as 2 analysts just weighed in on Nestlé SA (NSRGF – Research Report) and Bj's Wholesale Club Holdings (BJ – Research Report) with bullish sentiments.
Confident Investing Starts Here:
Nestlé SA (NSRGF)
Kepler Capital analyst Jon Cox maintained a Buy rating on Nestlé SA on May 21 and set a price target of CHF95.00. The company's shares closed last Thursday at $105.74, close to its 52-week high of $110.96.
Cox has an average return of 4.3% when recommending Nestlé SA.
According to TipRanks.com, Cox is ranked #2165 out of 9559 analysts.
The word on The Street in general, suggests a Hold analyst consensus rating for Nestlé SA with a $104.79 average price target.
TD Cowen analyst Oliver Chen reiterated a Buy rating on Bj's Wholesale Club Holdings yesterday and set a price target of $140.00. The company's shares closed last Thursday at $115.97, close to its 52-week high of $118.40.
According to TipRanks.com, Chen is a 4-star analyst with an average return of 5.5% and a 52.2% success rate. Chen covers the NA sector, focusing on stocks such as The Estée Lauder Companies, Brilliant Earth Group, and Canada Goose Holdings.
Bj's Wholesale Club Holdings has an analyst consensus of Moderate Buy, with a price target consensus of $119.79, implying a -0.2% downside from current levels. In a report issued on May 15, Citi also maintained a Buy rating on the stock.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Forbes
a day ago
- Forbes
Assume Leak: The New Baseline For Non-Human Identity Security
Ofir Har-Chen is the CEO and Co-Founder of Clutch Security, a leader in Non-Human Identity security and management. The security industry was transformed when we embraced a simple but radical mindset: assume breach. It forced us to move beyond perimeter-based thinking and adopt a layered, resilient architecture—one that acknowledges compromise as a starting point. Today, it's time to apply that same pragmatism to a threat vector that's grown quietly and dangerously: non-human identities (NHIs). NHIs are everywhere—API keys, service accounts, tokens, secrets and certificates. They're now the dominant actors in most enterprise systems. And they're not protected like users—they don't change their password often, they're rarely monitored and they're frequently overpermissioned. In most enterprises, NHIs outnumber human users by 82 to one (download). Every one of them is a potential breach point. And most are invisible to the teams responsible for securing them. Worse: They leak constantly. They're hardcoded into repos. They're stored in build logs. They're exposed in misconfigured cloud services. They're shared in Slack. They're left behind in forgotten vaults. Most security teams don't know when it happens. And even when they do, they often can't answer the only question that matters: Was this identity used by an attacker before we found it? Much like the assume-breach mindset led organizations to embed detection and response across every layer of the network, assume leak reframes how we manage NHIs—treating every secret or credential as potentially exposed, unless proven otherwise. This mindset changes the questions we ask. It's no longer just 'Is this secret stored securely?' but rather, 'If this secret were leaked right now, would we detect it? Would it matter?' It also redefines maturity. A mature security program isn't one that rotates credentials every 90 days—it's one that can detect misuse within 90 seconds. Finally, it changes how we architect access. Least privilege remains the goal, but detectability becomes a core requirement. Temporary credentials reduce risk, but observability and attribution must be built in and uncompromising. We have to assume secrets will eventually leak. Maybe not today or tomorrow, but at some point, they will. So far, the industry's response to secret sprawl and leakage risk has been largely reactive: Store credentials in vaults and run scanners to catch accidental exposure. But these are point-in-time controls, built on a flawed assumption—that secrets, if stored securely, are inherently safe. Vaults are necessary, but they aren't sufficient: They only protect secrets at rest. The moment a secret is used—in a script, an API call or a pipeline—the vault loses all visibility and control. If you're not monitoring how secrets are used, then storing them securely becomes little more than a comforting illusion. We've seen it firsthand: When we intentionally leak credentials (for research purposes), they're often exploited within minutes. Sometimes seconds. The internet doesn't wait. But your logs do. Your detection logic does. And your ticket queues? They definitely do. According to IBM researchers, data breaches involving compromised credentials cost organizations an average of $4.81 million. Even more concerning, breaches involving stolen or compromised credentials take an average of 292 days to detect—nearly a year of undetected access, lateral movement and persistent threat activity. When NHIs are compromised, attackers aren't just getting in—they're staying in. And because these identities often carry elevated or infrastructure-level access, the blast radius is often massive. The assume-leak mindset isn't about paranoia—it's about precision. We stop asking if a credential might be compromised and start asking what would happen if it already is. That forces better controls: • Identity-Centric Detection: Every credential should have a behavioral baseline. Unexpected usage—from a new region, at a strange hour or against sensitive resources—should trigger an immediate response. • Zero Trust For NHIs: Credentials shouldn't be implicitly trusted. Context-aware validation, privilege boundaries and real-time access decisions must apply to NHIs just as rigorously as they do to human users. • Ephemeral Credentials By Default: Standing access is risky. Credentials should expire by time, scope or inactivity—and be provisioned dynamically when needed. Security teams need to shift from credential storage to credential runtime defense. The eggshell is long gone. So is the blind trust in secrets. It's time we apply the same grown-up thinking to our non-human identities that we've applied to endpoints, users and networks. We assumed breaches to build more resilient networks. Now, we must assume leaks to secure the credentials that power them. This isn't a call to abandon (essential) prevention. It's a call to recognize its limits. Ask yourself: If your API key leaks today, would it give an attacker unrestricted access to your production environment? Or would it hit a wall? The answer to that question will define whether your organization is ready for the next generation of identity-based threats. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?


USA Today
2 days ago
- USA Today
Eagles' salary cap: Breaking down Philadelphia's $55 million in dead money for 2025
Eagles' salary cap: Breaking down Philadelphia's $55 million in dead money for 2025 The Eagles have $27 million in available cap space right now, but could have a ton more if not for a $55M dead salary cap hit that puts Philadelphia among the top seven in the NFL, per Over The Cap The Eagles have $27 million in available cap space right now, but could have a ton more if not for a $55 million dead salary cap hit that places Philadelphia among the top seven in the NFL, per Over The Cap. It wasn't the official start of summer in the NFL, but June 1 was a massive date around the league, and that date played a crucial role in several players moving on or teams taking a risk on a considerable trade. In NFL terminology, June 1 is the final day that teams see all future prorated money accelerate as 'dead money' if a player has been released. Teams like the Eagles and others around the NFL gained salary cap space, as any player designated for a post-June one release earlier this year moves from the active roster to the dead money side of the books. What, exactly, is a dead money charge? A dead money charge is a charge on an NFL team's salary cap for a player no longer on the roster. It represents any remaining signing bonus proration that was not accounted for before the player's release or trade. It is not a cash payment but rather a cap charge resulting from the rule that allows teams to prorate a signing bonus evenly over as many as five years. If a player is released before the end of those five years, all remaining signing bonus proration accelerates onto the team's salary cap for the current year. With the second week of OTAs underway, we're examining the hefty dead money hits. Jason Kelce Dead money: $16,438,000 Year two of retirement sees the future Hall of Famer carrying a hefty bulk of the Eagles' cap. Josh Sweat Dead money: $16.4M Sweat took his talents to Arizona, but a reworked contract from 2024 adds to the cap hit. Fletcher Cox Dead money: $10.1 million Year two of retirement for the dominant defensive tackle sees his final dead-money cap hit. Cox returned to the Eagles last spring on a one-year, $10 million contract. The contract was fully guaranteed, with four void years structured for a post-June one release in 2024. Cox's retirement will save Philadelphia $1.5 million while adding $4.2 million in dead salary cap space. The Eagles will also have $4.2 million in dead money from Cox's contract in 2025 and 2026. C.J. Gardner-Johnson Dead money: $4,620,000 Mekhi Becton Dead money: $3,484,706 Zack Baun Dead money: $1.9 million Devin White Dead money: $1.9 million Dylan McMahon Dead money: $139K


Business Insider
3 days ago
- Business Insider
UBS Sticks to Their Buy Rating for Akeso, Inc. (9926)
UBS analyst Chen Chen maintained a Buy rating on Akeso, Inc. (9926 – Research Report) yesterday and set a price target of HK$112.10. The company's shares closed yesterday at HK$83.80. Confident Investing Starts Here: Chen covers the Healthcare sector, focusing on stocks such as RemeGen Co. Ltd. Class H, Hangzhou Tigermed Consulting Co., Ltd. Class H, and Akeso, Inc.. According to TipRanks, Chen has an average return of 54.7% and a 78.57% success rate on recommended stocks. Currently, the analyst consensus on Akeso, Inc. is a Strong Buy with an average price target of HK$103.71, which is a 23.76% upside from current levels. In a report released yesterday, Morgan Stanley also maintained a Buy rating on the stock with a HK$87.00 price target.