If you want to have reasonably secure hardware for Qubes, wait until Qubes is available for the V54 series from NovaCustoms. This would give you at least reasonably secure boot (heads without boot guard is a security theater as Tommy likes to call it https://deploy-preview-244--privsec-dev.netlify.app/posts/knowledge/laptop-hardware-security/#heads).
The problem with modern Dell Latitudes or Thinkpads is that you will no longer have boot security (QubesOS does not support UFEI Secure Boot and Heads is not available for modern Latitudes/Thinkpads).
You could try to solve this with Trenchboot, but iirc Tommy gave up on it at some point.
JackMurphy opinions on Qubes OS vs Windows (WDAC + WDAG + VMs)
Under the right conditions (e.g. 7th generation Surface Business laptops and a well configured Windows 11 Enterprise) HyperV VM spamming would be more “secure” than Qubes (e.g. you could use the hard and firmware security features of the MS Surface devices, have better boot security with Windows Trusted Boot, have secure guest VMs if you use Windows 11 VMs, ...).
This is not just my opinion, wj25czxj47bu6q from Privsec once posted this in a similar way in the Privsec Matrix Room.
If anything I have written is wrong, please feel free to correct me