Back to News
Market Impact: 0.25

Google sets 2029 deadline to prepare for quantum cyber threat

GOOGLGOOG
Cybersecurity & Data PrivacyTechnology & InnovationRegulation & LegislationGeopolitics & War
Google sets 2029 deadline to prepare for quantum cyber threat

Google set a firm timeline to migrate to post-quantum cryptography (PQC) by 2029 and urged the industry to follow, warning that future quantum computers could break current encryption. The company flagged the "store now, decrypt later" risk to data generated today and noted governments (UK, France, Germany, Netherlands, US) are issuing strategies while the EU targets an operational pan‑European quantum communication infrastructure by 2027. Portfolio implication: accelerate PQC readiness, inventory long‑lived sensitive data, and monitor demand uplift for cybersecurity vendors and quantum/infrastructure providers over the coming years.

Analysis

The most immediate winners are vendors that can productize and monetize a coordinated migration: cloud infra providers that bundle PQC as a service, SaaS security firms that convert one-off upgrade spend into recurring managed-service revenue, and semiconductor firms that sell secure elements, HSMs and accelerator cards. Incumbent vendors with appliance-heavy sales and long upgrade cycles (hardware VPNs, on-prem HSMs, certificate authorities with high-touch processes) will face both direct CAPEX to refit products and indirect churn as customers move to cloud-managed key lifecycles. Supply-chain effects are non-linear: a sustained migration creates multiyear demand for secure silicon and firmware engineers, increasing lead times for TPM/HSM modules and putting pressure on foundry capacity for niche secure components. Governments and regulated industries will sign multi-year contracts that front-load professional services and consulting revenue (2–4x uplift in the first 12–18 months of contracts) while reducing future one-off integration fees. Key risks are binary and asymmetric. A credible quantum breakthrough or a high-profile PQC implementation failure would compress timelines and spike defensive spending (positive for defenders, negative for underprepared incumbents), while slower-than-expected standard adoption or interoperability problems could push renewal cycles out and leave vendor upgrade capex stranded. Near-term catalysts to watch: large cloud providers' pilot disclosures, major enterprise RFPs, NIST/standards updates, and any publicized 'store now, decrypt later' breaches — these will move valuations within quarters rather than years.