EMA IT & Data Management Research, Industry Analysis & Consulting

Why Cloudflare’s PQC Roadmap is a Wake-Up Call

Apr 21, 2026 9:48:15 AM

If you thought "Q-Day" was a problem for the 2040s, it’s time to check your calendar: the goalposts just moved (again), and they moved significantly closer (again).

We’ve talked about Post-Quantum Cryptography (PQC) for a while now, in our regular podcast and most recently with the announcement from Google. But Cloudflare’s recent announcement—targeting full post-quantum security, including authentication, by 2029—changes the vibe entirely. When one of the biggest gatekeepers of the internet sets a hard deadline three years out from now, the rest of us need to stop treating this like a science project and start treating it like a migration project.

For years, the standard warning was about HNDL (Harvest Now, Decrypt Later). The idea was simple: bad actors are sucking up your encrypted data today so they can crack it once they have a quantum computer in a decade. That’s a scary thought, but it was also a "future" problem.

What Cloudflare is signaling now is that the threat is maturing faster than we expected. With advancements from Google and researchers like Oratomic, the focus is shifting. It’s no longer just about protecting the data that's sitting in a vault; it’s about the very keys to the front door. We’re talking about quantum-safe authentication. If your authentication systems are vulnerable, a quantum-capable adversary doesn't need to wait ten years to decrypt your data—they can just impersonate a user and walk right in the moment they have the hardware.

Setting a 2029 goal is aggressive, but it’s grounded in reality. Transitioning a global infrastructure to PQC isn't as simple as flipping a switch. It involves auditing every long-lived key, every certificate, and every third-party dependency in your stack.

In my experience, these migrations take years—not months. If Cloudflare wants to be "full PQC" by 2029, they are likely starting the heavy lifting right now. For the average enterprise, this means your vulnerability assessments for RSA and ECC-based systems need to be on the 2026-2027 roadmap, not pushed off to 2030.

This isn't just increased brain damage for my bearded brethren in the server rooms and tech caves. This is a board-level risk (yes, pointy-haired bosses: I’m talking to you).

We’re going to see a lot more pressure from regulatory bodies to establish clear timelines. I expect to see governments stepping in to mandate PQC standards for critical infrastructure sooner rather than later. Fragmentation is the enemy here; if we don’t have a cohesive response, we’re just leaving gaps for attackers to exploit.

Agility is going to be the name of the game. The standards are still evolving, which means the tools we use today might need an update tomorrow. As an industry, we need to move away from "set and forget" security. If you’re an IT manager or a CISO, my advice is simple:

start the inventory now. Identify your high-value targets—the systems that would be the most rewarding for the first generation of quantum computers to hit. Because when 2029 rolls around, "we weren't ready" isn't going to be an acceptable excuse. “We weren’t aware” or “we didn’t think it would be so soon” isn’t going to cut it either.

Chris Steffen

Written by Chris Steffen

Christopher Steffen, CISSP, CISA, is the vice president of research at EMA, covering information security, risk, and compliance management. Before EMA, he served as the CIO for a financial services firm, focusing on FedRAMP compliance and security. He has also served in executive and leadership roles in numerous industry verticals. Steffen has presented at numerous industry conferences and has been interviewed by multiple online and print media sources. Steffen holds over a dozen technical certifications, including CISSP and CISA.

  • There are no suggestions because the search field is empty.

Lists by Topic

see all

Posts by Topic

see all

Recent Posts