Crown Holdings, Inc. (CCK): A Bull Case Theory
A high-speed robotic arm carefully packing aluminum cans into a cardboard carton.
Crown Holdings, named after the iconic 'crown cork' bottle cap invented in 1892, has evolved into a leading global producer of aluminium beverage cans, which now account for 80% of its profit contribution. Operating 70 can factories globally, Crown supplies major beverage segments including soda, beer, energy drinks, and seltzers.
Despite the commodity-like nature of cans, Crown earns robust 14% EBITA margins and a 35% pre-tax return on tangible capital, thanks to a durable moat built on geographic advantages and rational industry behavior. The high logistical costs of transporting empty cans over long distances, combined with high upfront capital costs and local market saturation, discourage new entrants and protect market share. The industry is also highly consolidated, with Crown, Ball, and Ardagh dominating North America.
Competitors like Ball adhere to disciplined capital allocation frameworks, ensuring rational growth and limited oversupply. Crown's customer relationships are sticky, with 90%+ retention supported by multi-year contracts and embedded operational linkages. The shift back to aluminium—driven by recyclability and premium positioning—has revived can volume growth after decades of stagnation, especially with rising demand for energy drinks and seltzers.
Crown's positioning in high-growth regions like Southeast Asia further strengthens its outlook. Despite recent demand fluctuations post-COVID and softness in Asia, Crown is shedding underperforming assets and sharpening its focus on cans. Valuation appears attractive with a 13.5–14x forward P/E and 6.5% FCF yield, trading at a discount to peers. While not reliant on a specific catalyst, Crown offers a compelling case for re-rating based on fundamentals and market structure.
Previously, we covered a bullish thesis on PepsiCo, Inc. by Kroker Equity Research in October 2024, which highlighted the company's strong brand portfolio, pricing power, and strategic partnership with Celsius as key growth drivers. The company's stock price has depreciated by approximately 25% since our coverage. This is because the thesis hasn't played out amid sector-wide headwinds. Hal shares a similar view on industry resilience but emphasizes the upstream opportunity in aluminium beverage cans through Crown Holdings.
CCK isn't on our list of the 30 Most Popular Stocks Among Hedge Funds. While we acknowledge the risk and potential of CCK as an investment, our conviction lies in the belief that some AI stocks hold greater promise for delivering higher returns and have limited downside risk. If you are looking for an extremely cheap AI stock that is also a major beneficiary of Trump tariffs and onshoring, see our free report on the best short-term AI stock.
READ NEXT: 8 Best Wide Moat Stocks to Buy Now and 30 Most Important AI Stocks According to BlackRock.
Disclosure: None. This article was originally published at Insider Monkey.
Se produjo un error al recuperar la información
Inicia sesión para acceder a tu portafolio
Se produjo un error al recuperar la información
Se produjo un error al recuperar la información
Se produjo un error al recuperar la información
Se produjo un error al recuperar la información
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
20 minutes ago
- Yahoo
Trump finally announces new tariff plan hours before deadline - but delays them yet again
The Trump administration announced its new trade policy and its tariff plan on Thursday, just hours before the August 1 trade deadline. On Thursday night, the Trump White House announced that a "universal" tariff for goods coming into U.S. will remain at 10 percent. That is the same level that President Donald Trump set during his "Liberation Day" even in early April when he first announced the tariffs. However, that 10 percent rate will only apply to countries with a trade surplus — in other words, countries to which the U.S,. exports more than it imports. A senior administration official told the Associated Press that most countries have trade surpluses with the U.S. The new tariff policy will not go into effect on Friday. Trump has delayed the tariffs for another week, until August 7, reportedly to give U.S. Customs and Border Protection time to make changes in how it policies incoming goods and to collect the new duties from imports.


Fox News
22 minutes ago
- Fox News
WATCH: Despite Trump criticism on stock trading ban, Hawley says president ‘wants to get it done'
Sen. Josh Hawley, R-Mo., said that despite President Trump's harsh criticism against a bill to ban stock trading among government leaders, the president 'wants to get it done.' (Credit: Nicholas Ballasy)


Forbes
22 minutes ago
- Forbes
The Growing Impact Of AI And Quantum On Cybersecurity
Artificial Intelligence and Quantum getty In mid-2025, we are entering the early stages of a new age of digital transformation where networked technologies that combine engineering, computer algorithms, and culture are becoming impactful on a global scale. The upcoming digital revolution and technological convergence will drastically affect our patterns of living, working, and networking in the near future. It is certain that science and technology will continue to propel humanity ahead at an exponential pace, and adapting to the emerging technological ecosystem will be critical to making that vision a reality. Organizations that aspire to succeed in the new digital economy must prioritize innovation, reliability, quality, cost-effectiveness, and security. The amalgamation of artificial intelligence with quantum computing will transform existing computational paradigms, heralding a promising future, but with risks. Digital Transformation Propelled by Emerging Technologies Technologies Impacting Digital Transformation Chuck Brooks Significant technical innovation is defining the transformative digital age. It is a time in history characterized by information exchange and analysis by intelligent systems powered by artificial intelligence algorithms and developing technologies. Such a digital revolution may increase efficiency and economic success, but it also introduces substantial security dangers. The transformative effects of emerging technologies in this year by artificial intelligence and quantum computing will be hugely impactful; however, their cybersecurity challenges on society will require the need for proactive security adaptation and collaboration to mitigate new threats. Cybersecurity Challenges for The New Technological Era The growing complexity of AI-enabled cyberattacks, as well as the urgent need for strong defensive systems, are serious cybersecurity issues. As organizations become increasingly linked and data-driven, their vulnerabilities grow. A proactive security posture, rather than a reactive one, is necessary to prosper and survive. This includes the need for ongoing monitoring, enhanced threat intelligence, and thorough incident response plans. Cybersecurity is more than just an IT concern; it is an essential component of every company strategy. In this age of instant digital connectivity, every company's operation, reputation, brand, and income streams are all at risk. Cybercrime is an issue that impacts every size company. Cybersecurity Ventures estimates that the cost of cybercrime will reach $10.5 trillion USD by the end of this year. Cybercrime To Cost The World $10.5 Trillion Annually By 2025 ( The Impact Of Artificial Intelligence on Cybersecurity Artificial Intelligence and Cybersecurity Chuck Brooks Cybersecurity and AI are key areas of focus in the emerging digital ecosystem. Artificial intelligence (AI) systems aim to reproduce human characteristics and processing power in a machine and outperform human speed and constraints. It is already taking place. Artificial intelligence (AI)-enabled computers are mostly used for automation tasks, including speech recognition, learning, planning, and problem-solving. By prioritizing and acting on data, AI technologies can make decision-making more efficient, especially in bigger networks with numerous users and factors. For cybersecurity, artificial intelligence may expedite the swift detection and identification of cyber threats. Cybersecurity companies have developed AI-powered software and platforms that oversee real-time network activities by analyzing data and files to detect unauthorized communication attempts, illicit connections, anomalous or malicious credential usage, brute force login attempts, atypical data movement, and data exfiltration. This allows organizations to gain statistical insights and protect against anomalies before their reporting and correction. AI improves network monitoring and threat detection tools for smart security by reducing noise, providing prioritized alarms, using contextual data supported by evidence, and performing automated analysis based on correlation indices from cyber threat intelligence. On-premises systems, cloud computing, and edge computing have made the total IT perimeter for many organizations and institutions more complex and dispersed. This requires improved threat detection, analysis, and incident response, as well as increased visibility. This is the most critical component of smart cybersecurity. Smart cybersecurity can detect, filter, neutralize, and remediate cyber threats. Additionally, predictive and generative AI algorithms may apply predictive models more effectively in cybersecurity, resulting in improved security data and results. AI solutions for threat intelligence and network monitoring may assist in improving cybersecurity. Generative AI (GenAI) may be able to deploy predictive models in cybersecurity in a more effective manner, yielding better outcomes and more reliable security data. AI agents and GenAI might collaborate to identify strategies to decrease risk while also improving cybersecurity knowledge and incident response for corporations and organizations. Generative AI can swiftly extract important information, best practices, and recommended actions from the security industry's corpus of knowledge. Agentic AI-enabled cybersecurity offers enormous promise for detecting, preventing, halting, and resolving cyberthreats. Agentic AI can assist with the primary issues of threat detection, response time, and analyst burden. These technologies automate duties while still allowing for human oversight, making security teams more effective in an increasingly perilous digital environment. While AI and ML are crucial tools for cyber defense, they may also provide asymmetrical tools for adversarial hackers. While they may be used to rapidly identify hazardous abnormalities and enhance cybersecurity measures, threat actors may also exploit them. Adversarial nations and nefarious hackers are now using AI and MI to discern and exploit vulnerabilities in threat-detecting frameworks. They use several techniques to do this. Their favored techniques often include automated phishing schemes that replicate human actions, with malware that autonomously alters itself to mislead or compromise cybersecurity frameworks and applications. Cybercriminals are now using AI and machine learning technologies to penetrate and analyze victims' networks. According to research issued Thursday by cybersecurity firm Team8, one in every four CISOs has encountered an AI-generated attack on their company's network in the last year, and AI threats are now at the top of their priority lists. According to Team8, the real number of firms attacked by AI-powered assaults "may be even higher," since most AI-driven threats imitate human behavior and are difficult to identify without sophisticated metrics such as time to exploitation and velocity indicators. AI, Risk, and the Road Ahead: Key Findings from the 2025 CISO Village Survey - Team8 A 2025 IBM/Ponemon Institute research study found that one out of every six breaches involved AI-driven attacks. Attackers are using generative AI to perfect and scale their phishing campaigns and other social engineering attacks. IBM: Cost of U.S. data breach reaches all-time high and shadow AI isn't helping | Network World Small firms, organizations that lack the in-house expertise, and the financial resources for significant investments in sophisticated cybersecurity mitigation technologies are the most vulnerable. Cybercriminals are using artificial intelligence technology to automate their attacks by accessing and analyzing victim networks. Their favorite strategies for deceiving or undermining cyber-defense systems and applications include self-modifying malware and automated phishing efforts. As a result, their focused attacks are more deadly, planned, and quick. Cybercriminals regularly use business email compromise (BEC) fraud schemes to defraud victims by impersonating a legitimate person or company. Hackers may use generative AI to create emails that closely resemble the language, style, and tone of the person or organization they are impersonating, confounding the difference between false and real communications. They can deploy AI tools that can even spoof a person with fake videos and voice mimicking. The most effective approaches for preventing and detecting spoofs and hacks entail always being vigilant. Avoid clicking on links in emails or websites without first checking the sender's identity. Install antivirus and AI-enabled spoof detection software and consider using packet filtering capabilities provided by multiple manufacturers. In addition, with AI-enabled attacks expanding, Zero Trust identity-centric security is important for recognizing identity access and management as the point of greatest marginal risk reduction. Clearly, AI is a transformative force in cybersecurity, offering both immense opportunities and significant risks. To succeed in this changing environment, organizations must take a comprehensive approach that combines advanced AI security tools with strong basic cybersecurity practices, focuses on proactive defense methods, and continuously adjust to new threats. Quantum Computing's Emerging Capabilities and Threats Quantum Computing Chuck Brooks Quantum computing works by harnessing the distinctive properties of atoms and subatomic particles. Physicists are creating quantum computers with exceptional computing speeds, enabling a new kind of analytics and cryptography. There are estimates that organizations are en route toward building commercially viable, fault-tolerant quantum computers within the decade. Quantum computing is becoming more viable as technology advances, making it easier to develop and more efficient at scaling. The gate model and quantum annealing are the two most used quantum computing strategies. Workable quantum solutions based on annealing systems are now widely used. And gate models may appear much sooner than expected. Some annealing quantum-type computers are already commercialized. Photonics computers, which use light photons instead of electrons for data transmission and processing, are already being manufactured in the quantum realm. The benefit of quantum photonic computing lies in its functionality at room temperature, since the particles exhibit greater stability. Quantum Computing Inc. (Nasdaq: QUBT), an innovative, integrated photonics and quantum optics technology company, recently announced the successful shipment of its first commercial entangled photon source to support research in quantum networking and secure communications. Quantum Computing Inc. Ships First Commercial Entangled Photon Source for Quantum Communication Research Quantum computing is expected to advance mankind into the future by revolutionizing artificial intelligence and data analytics. As we reach the achievement of a fully functional quantum computer, a new domain of supercomputing arises that will impact practically every aspect of our lives. The computational power and velocity of quantum computing will assist in addressing some of the most significant and intricate concerns confronting humanity. Quantum computing will allow computers to analyze extensive data sets and conduct analyses at remarkable speeds. It will enable the rapid downloading of whole libraries in only seconds. The incorporation of AI will significantly alter society in terms of research, education, and predictive analytics. Quantum computing will be transformative to all society and enable exponentially faster problem-solving compared to classical computing, especially for complex fields like cryptography, materials science, and AI. Conversely, quantum computing could potentially disrupt the entire cybersecurity ecosystem in the near future. The achievement of quantum computing, along with the concept of quantum supremacy, may raise significant concerns. The United States and other countries are apprehensive that hackers are now pilfering data to be decrypted by quantum computers within the next ten years. The same computing capacity that enables rapid decoding or resolution of complex issues might also be used to undermine cybersecurity. This poses a direct danger to banking systems and other essential infrastructure. A typical computer would need a billion years to decrypt the current RSA-2048 standard encryption. A functioning quantum computer may possibly achieve a break-in in under two minutes. Q-Day, as called by quantum researchers, is the time when powerful quantum computers might use Shor's method to break all public key systems that depend on integer factorization and other security techniques. It will make today's security mechanisms obsolete. Governments, standards groups like NIST, and cybersecurity experts warn that the countdown to Q-Day has already begun. NIST's Post-Quantum Cryptography Project is working to standardize new cryptographic algorithms that are resistant to quantum assaults. A document that has been prepared by the Office of Management and Budget instructs government agencies to completely transition to a post-quantum cryptography standard. Quantum computing may improve cybersecurity by using improved cryptography algorithms. Quantum Key Distribution (QKD) creates secure communication channels by using quantum mechanics concepts. In QKD, every effort to eavesdrop affects the quantum state, quickly informing both parties. Post-Quantum Cryptography (PQC) strives to provide encryption algorithms that are resilient to quantum attacks. As per the latest findings of ISACA's worldwide Quantum Computing Pulse Poll. Even while 62% of cybersecurity and technology experts fear that quantum computing will crack current internet encryption, just 5% think that it is a top concern for the near future and just 5% indicate that their companies have a clear plan for quantum computing. Chris Dimitriadis, Chief Global Strategy Officer at ISACA, provides a good summary of the importance of both AI and quantum for our future and cybersecurity. ' As a society that relies so heavily on digital systems, it's imperative that we take this seriously. Organizations must make sure that they are already planning about how their operations might look in a post-quantum world while they keep developing a trained workforce on AI. They simply cannot afford to defer this critical preparation, risking the stability of the global economy itself. We need to build a holistically trained workforce on Quantum (and continue doing this for AI) and then create a plan for transition to the post-quantum era, enabling the safe adoption of these emerging technologies, so we can enjoy the benefits of innovation in a safe manner.' Press Releases 2025 Quantum computings rapid rise is a risk to cybersecurity and business stability The remainder of 2025 will witness a range of both new and old cyberthreats as cutting-edge technologies like artificial intelligence and quantum computing develop in functionality and understanding. This year will be especially challenging for everyone involved in protecting their data and company continuity against cyberattacks. To confront the expanding cyber threats going forward in our new digital era, it will be important to understand the evolving threat landscape and adapt to it with a comprehensive strategy that addresses both old and new threats. Cybersecurity will need more investments in people and processes, stronger public-private sector collaboration, and a comprehensive risk management approach. With the advent of artificial intelligence and quantum computing, there is little time to lose.