Everyone is chasing quantum hardware today. I think the bottleneck may be quantum security.
Quantum stocks are running today because the U.S. government is reportedly putting around $2B into quantum companies and taking equity stakes in the process. IBM is getting the biggest piece. GlobalFoundries is getting a major manufacturing role. D-Wave and Rigetti are also reportedly getting meaningful funding. So, the obvious reaction is simple: buy the quantum hardware names and chase the move.
I get that.
If Washington is willing to put real money behind quantum, then the hardware layer matters. You need qubits, foundries, cryogenics, photonics, control systems, and all the boring manufacturing infrastructure that makes the machines possible.
But I think there is another layer that may become even more important as this story matures.
Almost everything digital still depends on cryptography that was designed before practical quantum computers existed. Banking, cloud, defense systems, software updates, telecom networks, code signing, identity, IoT devices, encrypted archives. The whole system assumes today’s encryption remains hard to break.
Quantum changes that assumption.
That does not mean a useful code-breaking quantum computer is here tomorrow. It does mean governments and large institutions cannot wait until the last second to start migrating. NIST already finalized its first post-quantum encryption standards in 2024 and encouraged system administrators to begin transitioning. CISA, NSA, and NIST have also told critical infrastructure operators to build quantum-readiness roadmaps, inventory where public-key cryptography is used, and prepare for migration.
That is the bottleneck.
It is not just writing a new encryption algorithm and calling it done. The hard part is finding every place old cryptography is buried, replacing it without breaking systems, testing vendors, updating certificates, changing hardware roots of trust, dealing with old devices that may never get patched, and protecting data that has to stay secret for years.
That is slow, expensive, ugly infrastructure work.
And that is exactly why I think post-quantum cybersecurity is worth watching.
| Low node / basket | Tickers |
|---|---|
| Core Quantum Computing | $IONQ, $RGTI, $QBTS, $QUBT, $INFQ, $XNDU |
| Quantum Cybersecurity | $ARQQ, $LAES, $BB, $FFIV, $OSPN, $RMBS, $CIEN |
| Quantum Computing Equipment / Enabling Hardware | $FORM, $MKSI |
| Tech Giants with Quantum Programs | $GOOGL, $MSFT, $IBM, $NVDA, $INTC, $HON, $BIDU, $BABA |
| Quantum ETF / Basket Exposure | $QTUM |
If quantum becomes a national-security priority, then security migration also becomes a national-security priority.
That brings a different set of names into the conversation.
But as a sector map, this is the layer I think people are underestimating.
What are your thoughts on Quantum Cybersecurity as the bottleneck layer?